Use business email compromise training to mitigate risk

“Please respond ASAP.” When CFO Joe receives an email from CEO Taylor with this urgent subject line, he goes into high alert. The message is pressing. The email’s sender,... Read more »

SolarWinds hack explained: Everything you need to know

2020 was a roller coaster of major, world-shaking events. We all couldn’t wait for the year to end. But just as the 2020 was about to close, it pulled... Read more »

Using content disarm and reconstruction for malware protection

The majority of malware infections begin with a phishing email. These simple lures, which trick recipients into opening malicious attachments or clicking links that lead to malicious web content,... Read more »

5 cybersecurity lessons from the SolarWinds breach

Forensics teams are still investigating how hackers were able to exploit SolarWinds’ patching system to attack numerous high-profile commercial and governmental organizations, including Microsoft and the U.S. Department of... Read more »

5 key ransomware protection best practices to safeguard assets

Ransomware attacks are expected to grow both in frequency and effectiveness in 2021, with researchers at Cybersecurity Ventures predicting attacks to occur every 11 seconds and ultimately cost victims... Read more »

Cloud security policy configuration in AWS, Azure and GCP

Modern security strategies should take an inside-out approach, not outside-in. “Understanding how to protect assets inside the security perimeter is far more important than focusing on preventing attackers from... Read more »

Design a human firewall training program in 5 steps

The proliferation of cybersecurity breaches is forcing government and business leaders to analyze the limitations of technology and reevaluate the role of people. Despite incredible advances in both threat... Read more »

Top 11 cloud security challenges and how to combat them

All the major promises of the cloud — improved IT efficiency, flexibility and scalability — come with one major challenge: security. Many organizations can’t delineate where cloud service provider... Read more »

SASE hype includes SD-WAN, but does it need to?

One of the more popular cybersecurity trends in 2021 will undoubtedly be Secure Access Service Edge, or SASE. As enterprise networks evolve to better manage traffic from remote employees,... Read more »

5-step IaaS security checklist for cloud customers

Many organizations have almost completely replaced virtual data centers, on-premises servers and appliances with IaaS. This widespread implementation requires a mobilization to secure IaaS environments to match this increased... Read more »
Subscribe to our Newsletter