The Cybereason Difference: Why PenTesters Don’t Want to be Our Valentine

This is the inaugural blog for our new series, The Cybereason Difference. Each post will explore a unique way that Cybereason empowers defenders. For this post, we decided to take a look at some of the reasons why we often get notes from our custo… Continue reading The Cybereason Difference: Why PenTesters Don’t Want to be Our Valentine

CISO Stories Podcast: Telling Scary Stories to the Board? Stop. Here’s Why…

CISOs today have varied tenures at organizations depending upon their ability to master learning the business of the organization. Enjoy this podcast with special guest Mischel Kwon to learn how to translate information security technical issues i… Continue reading CISO Stories Podcast: Telling Scary Stories to the Board? Stop. Here’s Why…

Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 1

There are plenty of reasons why law enforcement should use AI for facial recognition – after all, humans are notoriously bad eye witnesses. However, placing AI in the hands of law enforcement does have its dangers due to the limitations of the tec… Continue reading Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 1

Malicious Life Podcast: Inside Clearview AI Facial Recognition

Clearview AI scrapes billions of images off social media and the open web, applies facial recognition algorithms on them, and sells that data to law enforcement agencies all over the world. But who are the people behind this secretive company, and… Continue reading Malicious Life Podcast: Inside Clearview AI Facial Recognition

Nearly One-Third of Attack Targets Weren’t Running SolarWinds

Approximately one-third of organizations affected by the SolarWinds supply chain attacks weren’t actually running the IT management company’s affected software.
The post Nearly One-Third of Attack Targets Weren’t Running SolarWinds appeared first … Continue reading Nearly One-Third of Attack Targets Weren’t Running SolarWinds

Wipro’s State of Cybersecurity Report Reveals Valuable Insights

It is true in general that technology is always changing, and the threat landscape is constantly evolving, but 2020 has amplified the cybersecurity challenge. Organizations of all sizes and across all industries already struggled to effectively ma… Continue reading Wipro’s State of Cybersecurity Report Reveals Valuable Insights

Last Hurrah: Executive Order to Protect IaaS Platforms from Malicious Actors

President Donald Trump signed an executive order to prevent foreign malicious cyber actors from misusing United States Infrastructure as a Service (IaaS) products. In the executive order, dated January 19, President Trump explained that foreign ma… Continue reading Last Hurrah: Executive Order to Protect IaaS Platforms from Malicious Actors