Cyber Resilience Insights

SUBSCRIBE NOW

Security
How Much Can We Expect Cyber Breaches to Grow?

The more things change, the more they seem to stay the same. It seems that in cybersecuri… Read More >

The more things change, the more they seem to stay the same. It seems that in cybersecurity, the more we attempt to stop or mitigate the damage of cybersecurity breaches, the more they occur. And why should we expect anything different when the rewards for cybercriminal behavior continue to prove w… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted May 20, 2019

Security
Is Dynamic Analysis Enough to Stop Evasive Malware Atta…

Malware authors are evolving a… Read More >

Malware authors are evolving as quickly as the AV and security vendors are. If you've been following industry news, you… Read More >

Meni Farjon

by Meni Farjon

Chief Scientist for Advanced Threat Detection

Posted May 15, 2019

Security
Airline Breaches Abound

It may be safer to fly in an a… Read More >

It may be safer to fly in an airplane than to book your travel. While there is a very remote chance you will come to ha… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted May 14, 2019

Security
Securing the Department of Homeland Security Way

Learn how the DHS recommends you approach cybersecurity. Homeland security was not a thin… Read More >

Learn how the DHS recommends you approach cybersecurity. Homeland security was not a thing much on the minds of anyone prior to Sept. 11, 2001. That changed with the successful terrorist attacks and shined a rather large spotlight on an ever-growing threat through cyber channels. In addition to cr… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted May 13, 2019

Archiving
Compliance Supervision: More Than Checking a Box

Compliance supervision reviewers face big challenges. It doesn’t have to be so compl… Read More >

Compliance supervision reviewers face big challenges. It doesn’t have to be so complicated. Compliance supervision is one of the most important areas of investment for archiving buyers today but is also unfortunately one of the stagnant areas of investment and innovation from archiving vendor… Read More >

Garth Landers

by Garth Landers

Product Marketing Director, Archiving

Posted May 08, 2019

Security
Threat Intelligence Best Practices for Lean IT Organiza…

Make your organization a harde… Read More >

Make your organization a harder target for adversaries to crack. Editor’s note: For cybersecurity professionals, … Read More >

Joshua Douglas

by Joshua Douglas

VP, Threat Intelligence

Posted May 07, 2019

Popular Posts

Older Posts

Security

Securing the NSA Way

What can you learn from NSA cybersecurity strategies? The United States National Security Agency originated as a unit to decipher coded communications in World War II and was officially formed as the NSA by President Harry S. Truman in 1952. Since …

Read More >

Security

Threat Intelligence Best Practices for Lean IT Organizations - Part 1

Here’s why looking at indicators of compromise isn’t enough. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organiza…

Read More >

Security

Phishing for Selfies? New Scam Targets Chase Bank Customers

Highlighting the importance of extra care no matter the device. Yes, we live in the age of the selfie. Admit it, you’ve taken them yourself. But, did you ever think selfies could be part of a phishing scam? The attackers have really outdone th…

Read More >

Security

Active Versus Passive Versus Host-Based Cyberattack Vectors

Know the difference and how you can prevent cyberattacks. Budding authors and journalist are taught the difference between active and passive voice in first year writing classes. They understand that active is about “doing” and passive i…

Read More >

categories

Read More >

View More

Popular Posts