(How Enterprises Can Guard Against Memory-Scraping Malware……………………………… 3 Controversial SMBv2 Security Questions: Disable or Patch? ………………..7 Best practices for dealing with microbotnets …………………………………… 11 How SSL-encrypted network connections are captured ………… …………………… 16Is cybersecurity a real threat to enterprises? …………………………………………)