
Gone in 24 hours: Why cybersecurity is not just for Black Friday
Don’t let your Black Friday precautions evaporate on Saturday!

Don’t let your Black Friday precautions evaporate on Saturday!

If your phone is stolen while it’s unlocked, you could end up worrying about way more than the value of the phone…

Organizations are becoming more aware of the need for MDR (managed detection and response) services to achieve real cyber resiliency. The increase in the quantity and sophistication of cyberattacks means that other, siloed solutions, fall short of fully protecting your organization. Whereas no one can guarantee that you won’t fall victim to a cyberattack, the use of MDR significantly decreases that risk and its overall impact. Implementing MDR also gives you the greatest chance of effectively and rapidly recovering from […]

Many legitimate tools, from programming libraries to adversary simulators, can directly be used either for good or for bad. What to do?

As cyber threats became more evolved and sophisticated, the cybersecurity industry responded by developing more complex technologies. These technologies included the ability to detect intrusions through behavioral analysis, as well as advanced technologies for determining patterns from numerous data sources that indicate a compromise or that an unauthorized user is lurking in an organization’s network. Each advancement improved the ability of cybersecurity professionals to combat cyber threats, but it also started siloing cybersecurity solutions. Eventually, multiple technologies and tools existed […]

Media headlines insisted that “RSA has been cracked.” But it hasn’t, so why did they say it had?

There’s no getting around it — the cloud is a necessity for modern businesses. These days it’s nearly impossible to run a business without interacting with the cloud in some way. While most businesses rely on cloud-based tools to conduct day-to-day operations, these tools also significantly expand a company’s attack surface. Cloud-related attacks are one of the top threats for businesses, with 80% of companies seeing an increase in the frequency of attacks in their cloud environments. Whether you’re storing […]

What sort of data collection is “fair and reasonable” when it’s your car doing the collecting?

Even if you’ve got cybersecurity covered in your own digital life, remember that friends don’t let friends get scammed!

In the last decade, cloud technology has become incredibly pervasive and a necessity for most businesses, especially those offering hybrid or remote work environments. According to G2, virtually all companies use at least one public or private cloud, and 85% of organizations will be “cloud first” by 2025. Even more important (from a security standpoint) is the fact that more than 60% of all corporate data is stored in the cloud. This data can be stored on cloud service providers […]

Learn what SOC 2 tells you about your suppliers, as well as how to make the most of the experience if you’re thinking of going for SOC 2 in your own business.

Join us for the fascinating story of how researchers in the UK and the US challenged received wisdom, and discovered how to share encryption keys securely, even with people you’ve never met.

Data breaches are at an all-time high, with the number of breaches almost doubling from 2022 to 2023. Most recently, CBS reported on a massive data breach that could likely contain the social security numbers (SSNs) of every US citizen. It’s a major leak of personally identifiable information (PII) and only adds to the amount of sensitive data, such as passwords and addresses, that has been leaked over the last decade. Although it’s easy to think that leaked PII in […]

Romance scams often lead to victim blaming. What can we do to avoid them, and to keep our own vulnerable friends and family safe?

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






