Infosec
Beating BEC with People, Process and Technology
Business email compromise (BEC) is a typically dispassionate piece of cybersecurity terminology that actually signifies one of the biggest online threats facing organizations today.
May 19, 2022
Read More
The Lapsus$ Group: Who They Are and How to Protect Your Business
Staying one step ahead of cybercriminals takes extensive effort, especially when the targets seem to constantly be moving. There are new and persistent threats coming onto the scene all the time, some more alarming and chaotic than others.
May 17, 2022
Read More
Network Detection and Response Becomes More Essential as Nation State Attacks Escalate
On March 21, President Biden declared that US critical infrastructure is likely to soon come under concerted attack from the Kremlin. In fact, these warnings have been coming for several weeks now — ever since Russia invaded Ukraine. The surprise in cyber and national security circles is that such attacks have yet to materialize. Russian […]
May 12, 2022
Read More
Emerging Technologies To Watch for Business Transformation
The link between technology adoption and business success has a long history of powerful impact. Failure to innovate ways to leverage technology will create gaps — and put you at a competitive disadvantage.
April 21, 2022
Read More
Cybersecurity For Tech Companies
With tech playing such a large role in critical infrastructure, national security, and healthcare, as well as the private sector, mitigating cyberattacks pre-empting vulnerabilities will continue to be a challenge.
April 12, 2022
Read More
Cybersecurity for SMBs: Why Small Businesses Need Cybersecurity
Reliable cybersecurity, and avoiding cyberattacks, is essential for businesses of any size.
March 24, 2022
Read More
Credential Stuffing: Why Businesses Must Act in 2022
The New York Attorney General Letitia James kicked off the year with a wake-up call for local businesses. Her office contacted 17 well-known brands to inform them that over a million customers had been compromised by credential stuffing attacks. Most were unaware they’d even been hit.
February 16, 2022
Read More
How Businesses Can Handle the Pandemic of Open Source Bugs
In mid-January, representatives from some of the world’s biggest tech companies and open source foundations were summoned to the White House. On the agenda: how to better manage the risks associated with open source software use.
February 15, 2022
Read More
The Biggest Cyber Threat to Business: How Ransomware Might Evolve in 2022
Ransomware broke new records in 2021, as cyber-criminals continued to exploit corporate security gaps and new trends associated with pandemic-era working. The question now is, what happens next?
February 10, 2022
Read More
What is Killware? What You Need to Know About the Newest Cybersecurity Threat
Cybercriminals are continually looking for new, creative ways to exploit vulnerabilities in your cybersecurity approach. That’s no secret. But what exactly is killware, and is it really as bad as some of the trending headlines suggest?
January 20, 2022
Read More