In the latest edition of Gartner's HypeCycle report on network security content cleaning technology ranks high on the priority matrix for network security.
Read MoreCyber threats and successful attacks have been on the rise for years. Due to this, the inadequacy of antivirus is also becoming increasingly apparent. Antivirus often updates its systems, but its operation continues to lag behind; antivirus is built for yesterday's problem. Cyber criminals are taking advantage of this and their successful attacks have unfortunately been increasing for years.
Read MoreCDR is an emerging technology in cybersecurity. CDR stands for “Content Disarm & Reconstruction”. It ensures that malicious content (such as macros, embedded objects and actions) is removed from files. All this happens without affecting the usability and appearance of the file...
Read MoreIn recent years there has been a large increase in the sale of software for carrying out cyber attacks. This is ready-made software. The result is that a cyber criminal (in the making) no longer needs to master technical know-how to carry out cyber attacks. It has become almost as simple as pressing a button, like shopping in the supermarket.
Read MoreArchive files such as RAR and ZIP are now more often used for malware distribution than regular Office documents such as Word and PDF. The growth in the use of archive files last quarter alone is 11%. This puts archive documents in the first place. Cybercriminals know this and play to build trust through clever use of social engineering and legitimate-looking websites.
Read MoreEvery organization is aware of the potential dangers of opening emails and clicking on forwarded links. Where this awareness has been established for users of e-mail and web pages after years of awareness training, this awareness appears to be less present when using social media. That is a shame, cybercriminals seize their opportunity.
Read More