Infosec

Beating BEC with People, Process and Technology

Business email compromise (BEC) is a typically dispassionate piece of cybersecurity terminology that actually signifies one of the biggest online threats facing organizations today.
May 19, 2022
Read More

The Lapsus$ Group: Who They Are and How to Protect Your Business

Staying one step ahead of cybercriminals takes extensive effort, especially when the targets seem to constantly be moving. There are new and persistent threats coming onto the scene all the time, some more alarming and chaotic than others.
May 17, 2022
Read More

Network Detection and Response Becomes More Essential as Nation State Attacks Escalate

On March 21, President Biden declared that US critical infrastructure is likely to soon come under concerted attack from the Kremlin. In fact, these warnings have been coming for several weeks now — ever since Russia invaded Ukraine. The surprise in cyber and national security circles is that such attacks have yet to materialize. Russian […]
May 12, 2022
Read More

Emerging Technologies To Watch for Business Transformation

The link between technology adoption and business success has a long history of powerful impact. Failure to innovate ways to leverage technology will create gaps — and put you at a competitive disadvantage.
April 21, 2022
Read More

Cybersecurity For Tech Companies

With tech playing such a large role in critical infrastructure, national security, and healthcare, as well as the private sector, mitigating cyberattacks pre-empting vulnerabilities will continue to be a challenge.
April 12, 2022
Read More

Cybersecurity for SMBs: Why Small Businesses Need Cybersecurity

Reliable cybersecurity, and avoiding cyberattacks, is essential for businesses of any size.
March 24, 2022
Read More

Credential Stuffing: Why Businesses Must Act in 2022

The New York Attorney General Letitia James kicked off the year with a wake-up call for local businesses. Her office contacted 17 well-known brands to inform them that over a million customers had been compromised by credential stuffing attacks. Most were unaware they’d even been hit.
February 16, 2022
Read More

How Businesses Can Handle the Pandemic of Open Source Bugs

In mid-January, representatives from some of the world’s biggest tech companies and open source foundations were summoned to the White House. On the agenda: how to better manage the risks associated with open source software use.
February 15, 2022
Read More

The Biggest Cyber Threat to Business: How Ransomware Might Evolve in 2022

Ransomware broke new records in 2021, as cyber-criminals continued to exploit corporate security gaps and new trends associated with pandemic-era working. The question now is, what happens next?
February 10, 2022
Read More

What is Killware? What You Need to Know About the Newest Cybersecurity Threat

Cybercriminals are continually looking for new, creative ways to exploit vulnerabilities in your cybersecurity approach. That’s no secret. But what exactly is killware, and is it really as bad as some of the trending headlines suggest? 
January 20, 2022
Read More