Security and the Open Office Environment

Once upon a time, employees spent their days in offices or cubicles, in their own space apart from other employees. Today it’s much different, with employees working in open-plan offices, where large, co-working tables replace closed-off cubicle… Continue reading Security and the Open Office Environment

Ransomware Attacks Keep Growing

Though ransomware attacks aren’t a recent phenomenon, they do seem to be increasing in frequency and intensity. If society has grown used to these kinds of cyberattacks, that’s about to change—with the reports of 20+ Texas governmental entities recent… Continue reading Ransomware Attacks Keep Growing

To Determine Insider Threat Risk, Chart It Out

Insider threats are a big problem, but you probably know that. And, consequently, the more people you have with access to your network and data, the bigger your attack vector becomes. While the negligent insider is the cause of most cyber incidents—ac… Continue reading To Determine Insider Threat Risk, Chart It Out

Orchestrating Network Security to Handle Cyberthreats

Unfortunately for companies, cybercriminals don’t need to invent the wheel when choosing a way to hack corporate networks. Black hat hackers have a choice of cyberthreats and attack methods on a silver platter. Nevertheless, certain types of cybercrim… Continue reading Orchestrating Network Security to Handle Cyberthreats

Security Awareness: Adding a Business Context

Putting security in a business context can help employees be more cautious with their organization’s resources In my first blog I would like to give my perspective on how to spread security awareness among employees. No matter how geeky an audie… Continue reading Security Awareness: Adding a Business Context

Behavior Analysis: Getting an Inside Track on Insider Threats

Understanding human behavior can help organizations better identify and root out malicious insiders Whether it’s a former student coming onto a college campus and destroying the school computers with a malicious USB or some other presumably trusted in… Continue reading Behavior Analysis: Getting an Inside Track on Insider Threats

How to Model Risk in an Apex Predator Cyber-World

Large-scale existential threats exist everywhere and can annihilate us with only trivial effort. Should we all throw everything we can at them? Continue reading How to Model Risk in an Apex Predator Cyber-World

Security Measures Every Company Should Employ

Here’s a list of security technologies every organization should consider to protect their valuable resources Chances are that you and your team are already or on the verge of subscribing to the many cloud-based services available today. Regardl… Continue reading Security Measures Every Company Should Employ

Security at Scale: Grow Your Security, Not Your Risk

As a company grows, its security must grow with it. Here’s how companies can scale their security to match their growth All businesses want to become the next big thing, but with great success often comes greater security issues. How does a comp… Continue reading Security at Scale: Grow Your Security, Not Your Risk

Learn How XDR Can Take Breach Protection Beyond Endpoint Security

How do you know whether an attacker has infiltrated your network? Can you really rely on an Endpoint Detection and Response (EDR) solution to be your go-to technology for identifying security breaches?

Endpoint detection and response (EDR) platform ha… Continue reading Learn How XDR Can Take Breach Protection Beyond Endpoint Security