A Few Thoughts..
So, You Want to Build a Hunt Team (Part 1) - Set Up and Buy In
With the ever-growing number of risks, vulnerabilities and threats an organization must defend...
What Makes a Next-Gen SIEM Effective?
Security Information and Event Management (SIEM) platforms analyze network data to identify and...
Cloud Application Shielding and Intelligent Threat Assessment
Cloud-based applications offer a litany of advantages to organizations. Cost efficiencies, flexible...
The Rise of Ransomware
Despite its introduction in the late ‘80s, ransomware has seen a substantial boom in popularity...
So Many Web-Based Applications, So Little Security
The beauty of programming languages is that any employee who knows how to code in a notable...
6 Things to Look For In A Managed Detection & Response Provider
According to Gartner [1] organizations in the market for managed detection and response services...
Email Should Enable Your Productivity, Not Put It at Risk
Email is by far the most popular attack vector for cyber attackers. They use email to infect their...
Why Do You Need Managed Detection & Response?
You may have heard of the term MDR, short for Managed Detection and Response, and wondered if your...
Keeping Your Medical Practice Safe From Cyber Attacks
Reading about the latest cybersecurity data breaches in the medical and medical insurance...
The Advanced Persistent Threat (APT)
If you spend much time reading about cybersecurity, it is common to come across the term Advanced...
Cybersecurity Awareness Training - What Works?
This article is part of our ‘Commissioned By’ series. It’s in response to a request from a Digital...