RSA Conference 2020 USA: What you can expect at this year’s event

It’s that time of year: RSA Conference 2020 USA is coming up in February. To prepare, we asked Britta Glade, Director of Content and Curation for RSA Conference, to tell us more about this year’s event. Read our Q&A for more on what’s in store at … Continue reading RSA Conference 2020 USA: What you can expect at this year’s event

Planning for 2020? Here are 3 cybersecurity trends to look out for

It’s almost 2020, which means teams are finalizing cyber budgets, strategies and goals. However, as you’re preparing for the new year, it’s important to keep an eye out for how the cybersecurity landscape might shift in 2020. From the rise in investor … Continue reading Planning for 2020? Here are 3 cybersecurity trends to look out for

What are CISOs’ most pressing cybersecurity challenges?

CISOs are increasingly preoccupied with digital transformation, migration to cloud environments, and data governance, a recent YL Ventures survey has shown. The Israeli venture capital firm polled almost 40 cybersecurity executives at leading enterpris… Continue reading What are CISOs’ most pressing cybersecurity challenges?

Know your enemy: Mapping adversary infrastructure quickly and accurately

Group-IB is a known quantity in the information security arena: in the sixteen years since its inception, the company – now headquartered in Singapore – has detected and detailed many high-profile threats, performed over a thousand successf… Continue reading Know your enemy: Mapping adversary infrastructure quickly and accurately

Reach the next frontier of security automation while maintaining visibility and control

As the technologies we rely on continue to evolve, they are growing at a rate that outpaces our ability to protect them. This increasing risk potential necessitates a change in approach and the ability for organizations to automate more of their networ… Continue reading Reach the next frontier of security automation while maintaining visibility and control

Hardware hacks: The next generation of cybercrime

Every 39 seconds there is a cyber attack affecting one out of three Americans. All organizations need to take proactive measures and think like the attackers that are infiltrating their networks. Despite the fact that businesses around the world are de… Continue reading Hardware hacks: The next generation of cybercrime

Data collection balancing act: Privacy, trust and consumer convenience

With the advent of laws like the EU’s GDPR and California’s CCPA, which are sure to be portents of things to come (i.e., more and better data privacy legislation), companies with a global presence are starting to think about whether they sh… Continue reading Data collection balancing act: Privacy, trust and consumer convenience

Hackers go phishing for the holidays

It’s that time of year again. Everyone’s busy – at work and at home. That includes cybercriminals, too. In fact, the holiday season is when busy, distracted people tend to be especially vulnerable to phishing attacks. Just one click on a phishing link … Continue reading Hackers go phishing for the holidays

Things to keep in mind when raising capital for your cybersecurity venture

Long-term business success is rarely (if ever) a result of stumbling into opportunities and making makeshift decisions. In cybersecurity, as in any other industry, one might start with a good idea and an adequate first realization of it, but if there i… Continue reading Things to keep in mind when raising capital for your cybersecurity venture

The holiday season: A cybercriminal’s winter wonderland

It’s the most wonderful time of the year – for cybercriminals that is. With increased online sales, major commercial holidays like Black Friday and Cyber Monday present plenty of cyberthreats for both companies and consumers. Aware of the uptick … Continue reading The holiday season: A cybercriminal’s winter wonderland