Featured Blogs
What Could (Pokémon) Go Wrong?
This blog was written by Bruce Snell. If you’re like me, your Facebook feed (and Twitter, Instagram, Vine, etc) has...
Trojanized Pokémon GO Android App Found in the Wild
Pokémon GO is a new mobile game that allows fans to “catch” Pokemons in the real world using augmented reality...
Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets
Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a...
Business Email Compromise Hurts Your Organization
As many workers do today, you probably get emails from your boss asking you to perform various tasks. You may...
The Decluttering Bug
I have a confession to make – I think I have become addicted to decluttering. Perhaps it is the by-product...
Going The Extra Mile: Pandora, Facebook, and Netflix Ask Users to Reset Passwords
It’s a good sign when businesses take the initiative to protect consumers’ online safety. Not only does it allow customers...
June #SecChat Recap: Findings from the 2016 Verizon DBIR
This year’s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and 2,260...
What It Takes for Security in the Internet of Things
The next time you buy a car, chances are, it’ll be connected to your phone. Maybe your next refrigerator, thermostat,...
Evolving Marketing Innovation – Our Strategy in the Security Technology Industry
Every year we recognize partners for achieving excellence in a variety of categories. Last month at our Americas Partner Summit,...
Study: Want an Epic Family Vacation this Year? Unplug!
Everyone talks about it but, c’mon, who really completely unplugs from tech completely on vacation? According to a recent study...
Mobile Pop-Ups, Digital Spam with a Side of Dangerous
Technology has become the personal assistant of our dreams, but also the crutch for our brains that we’ve grown increasingly...
Oversharing – Don’t Blame It All On The Kids!
No matter which way you interpret the plethora of research, it is very clear – our teens are oversharing. The...
The Channel Transformation to Ascend
This blog was written by Richard Steranka. In our continued quest to become our customers’ #1 security vendor and our...
EMEA Channel Partner Summit: The highlights
This blog was written by David Small. As we look ahead to our annual FOCUS Security conference, a three day...
Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection
Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans...
New Campaign Kits: Elevate Your Marketing by Elevating Your Conversations
IT decision makers have spoken – good information is hard to find. According to IDG’s 2016 Customer Engagement Research, a...
Are You Safer Unplugging on Vacation?
This blog was written by Bruce Snell. You probably know by now that I love technology. I have either my...
Survey: More Than Half of Travelers Couldn’t Unplug on Vacation
Everybody knows it, everybody admits it, and everybody seems to accept it. We’re addicted to our mobile phones. While over-attachment...