Cyber Resilience Insights

SUBSCRIBE NOW

Security
Nearly Half of All Breaches are on SMBs

Convince the cybersecurity skeptics with this and other data points. When you're making y… Read More >

Convince the cybersecurity skeptics with this and other data points. When you're making your case to for advanced security solutions back to your business/finance colleagues at your small-to-medium sized organization, it's helpful to have cold, hard facts from the cybersecurity world to help make y… Read More >

Ed Jennings

by Ed Jennings

Chief Operating Officer

Posted May 22, 2019

Security
How Much Can We Expect Cyber Breaches to Grow?

The more things change, the mo… Read More >

The more things change, the more they seem to stay the same. It seems that in cybersecurity, the more we attempt to sto… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted May 20, 2019

Security
Is Dynamic Analysis Enough to Stop Evasive Malware Atta…

Malware authors are evolving a… Read More >

Malware authors are evolving as quickly as the AV and security vendors are. If you've been following industry news, you… Read More >

Meni Farjon

by Meni Farjon

Chief Scientist for Advanced Threat Detection

Posted May 15, 2019

Security
Airline Breaches Abound

It may be safer to fly in an airplane than to book your travel. While there is a very rem… Read More >

It may be safer to fly in an airplane than to book your travel. While there is a very remote chance you will come to harm while flying, it seems that based on the news lately you can come to cyber-theft harm just through booking your flights. Cyber criminals have been targeting airlines and succee… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted May 14, 2019

Security
Securing the Department of Homeland Security Way

Learn how the DHS recommends you approach cybersecurity. Homeland security was not a thin… Read More >

Learn how the DHS recommends you approach cybersecurity. Homeland security was not a thing much on the minds of anyone prior to Sept. 11, 2001. That changed with the successful terrorist attacks and shined a rather large spotlight on an ever-growing threat through cyber channels. In addition to cr… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted May 13, 2019

Archiving
Compliance Supervision: More Than Checking a Box

Compliance supervision reviewe… Read More >

Compliance supervision reviewers face big challenges. It doesn’t have to be so complicated. Compliance supervisio… Read More >

Garth Landers

by Garth Landers

Product Marketing Director, Archiving

Posted May 08, 2019

Popular Posts

Older Posts

Security

Threat Intelligence Best Practices for Lean IT Organizations: Part 2

Make your organization a harder target for adversaries to crack. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organization. In…

Read More >

Security

Securing the NSA Way

What can you learn from NSA cybersecurity strategies? The United States National Security Agency originated as a unit to decipher coded communications in World War II and was officially formed as the NSA by President Harry S. Truman in 1952. Since …

Read More >

Security

Threat Intelligence Best Practices for Lean IT Organizations - Part 1

Here’s why looking at indicators of compromise isn’t enough. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organiza…

Read More >

Security

Phishing for Selfies? New Scam Targets Chase Bank Customers

Highlighting the importance of extra care no matter the device. Yes, we live in the age of the selfie. Admit it, you’ve taken them yourself. But, did you ever think selfies could be part of a phishing scam? The attackers have really outdone th…

Read More >

categories

Read More >

View More

Popular Posts