Security

Why Understanding Zero-Day Exploits Matter

No one wants to be the first to face a new cyberattack. Let’s face it, the potential for being the first organization to be hit with the next creative zero-day cyberattack strikes fear into the heart of every CISO and IT security professional.…

Read More
Security

Cyber Monday and Holiday Season Security Woes

Here's how to get your security prepared for holiday season. You absolutely have to love the power of marketing when accomplished on a large scale. First there was “Black Friday” where, starting in the 1950s, brick and mortar retailers c…

Read More
Security, Cyber Resilience for Email

Improve Threat Detection and Response with SIEM Integration

Add email security data into SIEM solutions for improved threat intelligence and response. Email is a catch 22. It’s the number one business communication tool and the number one cyberattack vector. As the lifeblood that keeps business running…

Read More
Security

Bridging the Cyber Divide – You’re the Weak Supply Chain Link

Cyberattackers are going after you to get to your biggest customers. Welcome to the latest installment of Bridging the Cyber Divide, our blog series focused on helping IT professionals at small-to-medium sized organizations make the case for enhance…

Read More
Security

Threat Intelligence for You: 5 Ways to Prove Value

You can do threat intelligence—even with a small budget. Editor’s Note: As part of an ongoing series, Threat Intelligence for You, we’re asking thought leaders in the Cyber Resilience Think Tank their thoughts about threat intellig…

Read More
Security

How Any Organization Can Succeed at Threat Intelligence

Threat intelligence can be a reality for anyone. That means you. Does the thought of starting a threat intelligence program at your organization make you break out in a cold sweat? Do you feel you don’t have the budget or resources to make it …

Read More
Security

Cybersecurity Myths Revisited

How many times have you come to accept a certain “truth” that eventually turned out to be complete fiction?  From “the world is flat” to “the Earth is the center of the universe” to “the government wou…

Read More
Security

Cyberthreats Cost More Than You Think

The costs of attacks are rising at an alarming rate. We've talked about how “Ignoring Cybersecurity Can Cost Millions” and highlighted how one US power company was fined $2.7 million over data exposure. This was just one of hun…

Read More
Archiving, Office-365

Office 365 Backup and Recovery in the Ransomware Era

The Old World Meets the New When It Comes to Backup and Recovery Many of us have the made the journey to Microsoft Office 365™ or are planning to do so soon. Many questions await us: how secure is it, who’s responsible for managing our d…

Read More
Security

Insider Threats Personified – The Data Thief

Do you know your insider threat personas? Most organizations focus on inbound emails when it comes to protecting against cyberattacks. But what happens when email security threats are introduced internally by your own employees? While this scenario …

Read More
Office-365

Office 365/Azure Multi-Factor Authentication Issue Leads to Downtime

“@Microsoft: please don’t ruin Thanksgiving.” Ah, Thanksgiving. Typically, a week full of family travels, exercising booked vacation time and in some cases, thinking ahead to bargain deals on Friday. But now, it’s perhaps not…

Read More
Security

The Definition of Innovative Cyber Threat Prevention

You've heard it all. Until now. By now, you have probably been exposed to every promise, sales pitch, marketing hype and yes, even technological wonder when it comes to new security solutions to old (and very pervasive) problems. However, disruptin…

Read More
Security

Building a Better Email Security Sandbox

You need the best security technology in today’s market. It’s no secret that kids love to get dirty and especially while playing in a sandbox, so much so that there are dozens of videos showing how to build the best sandbox for just this…

Read More
Security

Threat Intelligence for You: Challenges and Advantages

What can threat intelligence mean for your organization? Editor’s note: Threat intelligence. It’s been one of the most talked-about themes in the cybersecurity space for years now. But what does it mean to you, and what can it mean for y…

Read More
Cyber Resilience for Email

Cyber Resilience News Nov. 13, 2018

Get the latest cybersecurity news. Cyberattackers have no scruples when it comes to their targets. In this week’s news roundup, we look at a particularly galling story of an email scam that stole a significant sum of money from a charity in th…

Read More
Security

Static vs. Behavior Cyberthreat Analysis: A Closer Look

You have a choice in cyberthreat protection. At the core of every cyberthreat protection or prevention solution is an analysis philosophy that forms not only the basis of the intellectual property of a given security vendor, but the very method by w…

Read More
Security

Cybersecurity Awareness: Take the Right Approach

Asking the experts on cyber awareness training. There’s never been a more critical time for awareness training for cybersecurity. Attacks of all kinds are on the rise and the ubiquity of technology in the lives of end users can create opportun…

Read More
Cyber Resilience for Email

Cyber Resilience News Nov. 6, 2018

Get the latest cybersecurity news. There are different approaches organizations can take to cybersecurity awareness training for employees. In this week’s news roundup, we look at one Canadian municipality that is taking a hard stand against employe…

Read More