As information security professionals, we spend a lot of time thinking about what security products are the highest priority. But as most of these...
Hi, what are you looking for?
As information security professionals, we spend a lot of time thinking about what security products are the highest priority. But as most of these...
Every week we hear of several new high profile ransomware incidents affecting hospitals, schools, businesses and government. It’s gotten so bad that cybersecurity agencies...
In late 2014 my company predicted that ransomware attacks would shift from consumers to businesses to extort larger ransoms for unlocking encrypted files. Unfortunately,...
Traditional endpoint antivirus, which relies on static signatures to identify malicious files, URLs and IP addresses has outlived its useful life. New attack techniques,...
An argument can certainly be made that the economics of cybersecurity largely favor the attacker. While the takedown of Darkode was a win for...
It’s important to acknowledge that “shadow IT” shouldn’t be feared. We live in an era where individual SaaS vendors maintain an increasing amount of...
By all accounts 2014 proved to be another monstrous year for security breaches. At times it seemed we couldn’t go a week without another...
We’ve all been there before. Something unforeseen happens that triggers a panic response. More often than not we look back at that response and...