Beveiliging

Why Understanding Zero-Day Exploits Matter

No one wants to be the first to face a new cyberattack. Let’s face it, the potential for being the first organization to be hit with the next creative zero-day cyberattack strikes fear into the heart of every CISO and IT security professional.…

Meer informatie
Beveiliging

Cyber Monday and Holiday Season Security Woes

Here's how to get your security prepared for holiday season. You absolutely have to love the power of marketing when accomplished on a large scale. First there was “Black Friday” where, starting in the 1950s, brick and mortar retailers c…

Meer informatie
Security, Cyber Resilience for Email

Improve Threat Detection and Response with SIEM Integration

Add email security data into SIEM solutions for improved threat intelligence and response. Email is a catch 22. It’s the number one business communication tool and the number one cyberattack vector. As the lifeblood that keeps business running…

Meer informatie
Beveiliging

Bridging the Cyber Divide – You’re the Weak Supply Chain Link

Cyberattackers are going after you to get to your biggest customers. Welcome to the latest installment of Bridging the Cyber Divide, our blog series focused on helping IT professionals at small-to-medium sized organizations make the case for enhance…

Meer informatie
Beveiliging

Threat Intelligence for You: 5 Ways to Prove Value

You can do threat intelligence—even with a small budget. Editor’s Note: As part of an ongoing series, Threat Intelligence for You, we’re asking thought leaders in the Cyber Resilience Think Tank their thoughts about threat intellig…

Meer informatie
Beveiliging

How Any Organization Can Succeed at Threat Intelligence

Threat intelligence can be a reality for anyone. That means you. Does the thought of starting a threat intelligence program at your organization make you break out in a cold sweat? Do you feel you don’t have the budget or resources to make it …

Meer informatie
Beveiliging

Cybersecurity Myths Revisited

How many times have you come to accept a certain “truth” that eventually turned out to be complete fiction?  From “the world is flat” to “the Earth is the center of the universe” to “the government wou…

Meer informatie
Beveiliging

Cyberthreats Cost More Than You Think

The costs of attacks are rising at an alarming rate. We've talked about how “Ignoring Cybersecurity Can Cost Millions” and highlighted how one US power company was fined $2.7 million over data exposure. This was just one of hun…

Meer informatie
Archiving, Office-365

Office 365 Backup and Recovery in the Ransomware Era

The Old World Meets the New When It Comes to Backup and Recovery Many of us have the made the journey to Microsoft Office 365™ or are planning to do so soon. Many questions await us: how secure is it, who’s responsible for managing our d…

Meer informatie
Beveiliging

Insider Threats Personified – The Data Thief

Do you know your insider threat personas? Most organizations focus on inbound emails when it comes to protecting against cyberattacks. But what happens when email security threats are introduced internally by your own employees? While this scenario …

Meer informatie
Office-365

Office 365/Azure Multi-Factor Authentication Issue Leads to Downtime

“@Microsoft: please don’t ruin Thanksgiving.” (Office 365 Outages reported Nov. 19, 2018 - Image source: DownDetector.com) Ah, Thanksgiving. Typically, a week full of family travels, exercising booked vacation time and in some case…

Meer informatie
Beveiliging

The Definition of Innovative Cyber Threat Prevention

You've heard it all. Until now. By now, you have probably been exposed to every promise, sales pitch, marketing hype and yes, even technological wonder when it comes to new security solutions to old (and very pervasive) problems. However, disruptin…

Meer informatie
Beveiliging

Building a Better Email Security Sandbox

You need the best security technology in today’s market. It’s no secret that kids love to get dirty and especially while playing in a sandbox, so much so that there are dozens of videos showing how to build the best sandbox for just this…

Meer informatie
Beveiliging

Threat Intelligence for You: Challenges and Advantages

What can threat intelligence mean for your organization? Editor’s note: Threat intelligence. It’s been one of the most talked-about themes in the cybersecurity space for years now. But what does it mean to you, and what can it mean for y…

Meer informatie
Cyber resilience voor e-mail

Cyber Resilience News Nov. 13, 2018

Get the latest cybersecurity news. Cyberattackers have no scruples when it comes to their targets. In this week’s news roundup, we look at a particularly galling story of an email scam that stole a significant sum of money from a charity in th…

Meer informatie
Beveiliging

Static vs. Behavior Cyberthreat Analysis: A Closer Look

You have a choice in cyberthreat protection. At the core of every cyberthreat protection or prevention solution is an analysis philosophy that forms not only the basis of the intellectual property of a given security vendor, but the very method by w…

Meer informatie
Beveiliging

Cybersecurity Awareness: Take the Right Approach

Asking the experts on cyber awareness training. There’s never been a more critical time for awareness training for cybersecurity. Attacks of all kinds are on the rise and the ubiquity of technology in the lives of end users can create opportunities …

Meer informatie
Cyber resilience voor e-mail

Cyber Resilience News Nov. 6, 2018

Get the latest cybersecurity news. There are different approaches organizations can take to cybersecurity awareness training for employees. In this week’s news roundup, we look at one Canadian municipality that is taking a hard stand against employe…

Meer informatie