Bridging the Cybersecurity Skills Gap as Cyber Risk Increases
Organizations Must Go Beyond Traditional Means of Recruiting Talent to Fill Security Roles
read more
Continue reading Bridging the Cybersecurity Skills Gap as Cyber Risk Increases
Collaborate Disseminate
Organizations Must Go Beyond Traditional Means of Recruiting Talent to Fill Security Roles
read more
Continue reading Bridging the Cybersecurity Skills Gap as Cyber Risk Increases
Thanks to the quick transition to remote work due to the current global pandemic – coupled with cybercriminals’ penchant for taking advantage of fear, uncertainty, and doubt – security researchers have seen a surge in cybersecurity issues. Cybercrimina… Continue reading Back to Basics: Pandemic Cybersecurity Trends and Solutions
Because remote workers’ devices are all connected to a home network, they don’t even need to be attacked directly. Instead, attackers have multiple avenues of attack that can be exploited. Continue reading Helping Remote Workers Overcome Remote Attacks
Mature machine learning can analyze attack strategies and look for underlying patterns that the AI system can use to predict an attacker’s next move. Continue reading Combining AI and Playbooks to Predict Cyberattacks
Check out our list of top 10 things to do to protect your organization from the deepening scourge of ransomware. Continue reading All in the (Ransomware) Family: 10 Ways to Take Action
Convincing employees to take security seriously takes more than awareness campaigns. Continue reading Managing the Human Security Factor in the Age of Ransomware
Here are things you can do right now to shore up your defenses and help your recovery when you get hit. Continue reading 10 Steps for Ransomware Protection
An analysis of threat techniques used by Silence Group, Goblin Panda and Zegost, which can help construct effective defenses. Continue reading Defense Takeaways from Three Adversary Playbooks
Traffic analysis sheds light on weekday habits of attackers such as the most likely day for attacks and how malicious infrastructure is shared. Continue reading Hackers Favor Weekdays for Attacks, Share Resources Often
Low-key but effective, steganography is an old-school trick of hiding code within a normal-looking image, where many cybersecurity pros may not think to look. Continue reading Malware Payloads Hide in Images: Steganography Gets a Reboot