Ransomware
Discover expert analysis on ransomware with news, features and insights from the team at IT Pro.
-
IDC: Modern application resilience with AI-driven automation
Whitepaper Improve application security and performance
By ITPro Published
Whitepaper -
NetApp eyes AI capabilities to tackle growing ransomware threats
News NetApp has added ML-based detection capabilities to its built-in ransomware detection system to help businesses detect and quickly recover from potential threats
By Solomon Klappholz Published
News -
UK firms are dangerously overconfident about paying ransoms to cyber criminals
Only 4% of organizations that pay up recover all their data, and many take months to recover
By Emma Woollacott Published
-
Ransomware series: Exploring the tools & solutions that comprise a comprehensive ransomware strategy
Learn about the latest trends in attack techniques and leading-edge defensive countermeasures
By ITPro Published
-
2024 State of the phish report
Whitepaper Risky actions, real-world threats and user resilience in an age of human-centric cybersecurity
By ITPro Last updated
Whitepaper -
Cloud security fears, rising costs, privacy concerns?
Whitepaper The factors driving the demand for on-premises infrastructure
By ITPro Published
Whitepaper -
Datto RMM: A security-first solution
Whitepaper Discover a robust, yet easy-to-manage security ecosystem for MSPs
By ITPro Last updated
Whitepaper -
Advanced email security
Whitepaper Protect against advanced email threats, streamline operations, and get actionable visibility into people risk and your threat landscape
By ITPro Published
Whitepaper -
Metrics that matter
Whitepaper The CISO’s guide to assessing, prioritizing, and justifying cybersecurity budgets that make business sense
By ITPro Published
Whitepaper -
The cost of ‘good enough’ security
Whitepaper Calculating the true value of cybersecurity solutions
By ITPro Published
Whitepaper -
Turning the tables
Whitepaper How smart email reporting and remediation can transform attackers’ favourite targets into your best defence
By ITPro Published
Whitepaper -
Cloud in the crosshairs
Whitepaper How cyber criminals exploit file-sharing, identity, and supply chain vulnerabilities in Microsoft 365
By ITPro Published
Whitepaper