What are script-based attacks and what can be done to prevent them?

Attackers always seek out new ways to evade detection. As most endpoint security products handle file-based attacks relatively well, scripts are an excellent way for attackers to avoid making changes to a disk, thus bypassing the threat detection capab… Continue reading What are script-based attacks and what can be done to prevent them?

How do I select an endpoint protection solution for my business?

Endpoint protection has evolved to safeguard from complex malware and evolving zero-day threats. To select an appropriate endpoint protection solution for your business, you need to think about a variety of factors. We’ve talked to several cybersecurit… Continue reading How do I select an endpoint protection solution for my business?

Lack of training, career development, and planning fuel the cybersecurity profession crisis

The cybersecurity skills crisis continues to worsen for the fourth year in a row and has impacted 70 percent of organizations, as revealed in a global study of cybersecurity professionals by ISSA and ESG. Cybersecurity profession crisis The top ramific… Continue reading Lack of training, career development, and planning fuel the cybersecurity profession crisis

The average total cost of a data breach declined, but costs increased for many organizations

Data breaches cost companies $3.86 million per breach on average, and compromised employee accounts are the most expensive root cause. Based on in-depth analysis of data breaches experienced by over 500 organizations worldwide, 80% of these incidents r… Continue reading The average total cost of a data breach declined, but costs increased for many organizations

Delivering and maintaining security at the speed of digital transformation

Dustin Rigg Hillard, CTO at eSentire, is responsible for leading product development and technology innovation. His vision is rooted in simplifying and accelerating the adoption of machine learning for new use cases. In this interview Dustin talks abou… Continue reading Delivering and maintaining security at the speed of digital transformation

Things to consider when selecting enterprise SSDs for critical workloads

The process of evaluating solid state drives (SSDs) for enterprise applications can present a number of challenges. You want maximum performance for the most demanding servers running mission-critical workloads. We sat down with Scott Hamilton, Senior … Continue reading Things to consider when selecting enterprise SSDs for critical workloads

How well do face recognition algorithms identify people wearing masks?

Now that so many of us are covering our faces to help reduce the spread of COVID-19, how well do face recognition algorithms identify people wearing masks? The answer, according to a preliminary study by the National Institute of Standards and Technolo… Continue reading How well do face recognition algorithms identify people wearing masks?

Review: Cyber Warfare – Truth, Tactics, and Strategies

Dr. Chase Cunningham holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism operations in cyberspace. He is a retired U.S. Navy chief with more than 20 yea… Continue reading Review: Cyber Warfare – Truth, Tactics, and Strategies

The distinction between human and bot behavior is becoming increasingly blurred

There’s no denying that the way people have been using the Internet and online stores has changed over the last couple of months. As consumers change their online habits, the distinction between human and bot behavior is becoming increasingly blurred, … Continue reading The distinction between human and bot behavior is becoming increasingly blurred