Building trust in a zero-trust environment

A recent study by MITRE and DTEX revealed that despite years of industry efforts against insider threats, there isn’t enough data – or systems advanced enough – to spot all malicious behavior. As companies work to build a corporate culture of cybersecu… Continue reading Building trust in a zero-trust environment

How prepared are organizations to face email-based ransomware attacks?

Proofpoint released a report which provides an in-depth look at user phishing awareness, vulnerability, and resilience. The report reveals that attackers were more active in 2021 than 2020, with findings uncovering that 78% of organizations saw email-b… Continue reading How prepared are organizations to face email-based ransomware attacks?

How challenging is corporate data protection?

Code42 released a report, conducted by Vanson Bourne, which found that cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data from exposure, leak and theft. Identified within the research are three … Continue reading How challenging is corporate data protection?

How QR code ease of use has broaden the attack surface

In this interview with Help Net Security, Neil Clauson, Regional CISO at Mimecast, talks about the threats of QR code phishing, explains the vulnerabilities of such technology and how to make sure not to fall prey to such attack. The pandemic has resur… Continue reading How QR code ease of use has broaden the attack surface

The four types of remote workers your security awareness program must address

No matter how much technology you acquire or how many specific technical controls you install, when it comes to your information security awareness program, the most important control to tune within your environment is your people. I’m not telling you … Continue reading The four types of remote workers your security awareness program must address

In 2022, AI-based full-suite security is needed

In 2021, ransomware became dinner table conversation. Not only were cybersecurity leaders focused on the ransomware pandemic, but also the general population learned the perils of ransomware. It’s a consistent breaking news headline and daily concern i… Continue reading In 2022, AI-based full-suite security is needed

The public sector is more concerned about external than internal threats

SolarWinds announced the findings of its Public Sector Cybersecurity Survey Report. This survey includes responses from 400 IT operations and security decision makers, including 200 federal, 100 state and local, and 100 education respondents. “These re… Continue reading The public sector is more concerned about external than internal threats

Eight resolutions to help navigate the new hybrid office model

Continuous review and improvement are crucial for a successful security program. As this year draws to a close, it is a good time to look back on 2021 and prepare a few resolutions for the new year. Adapting to the pandemic-created hybrid office model … Continue reading Eight resolutions to help navigate the new hybrid office model

SMBs should consider new approaches for increasing their cybersecurity posture

SMBs can obtain advice about cybersecurity quite easily from a plethora of resources. Getting their hands on practical technology solutions is, on the other hand, more of a problem, as they are often greatly constrained by their budget. Still, there ar… Continue reading SMBs should consider new approaches for increasing their cybersecurity posture

Insider threat does not have to be malicious, so how do you protect your organization?

In this interview with Help Net Security, Laura Hoffner, Chief of Staff at Concentric, talks about the causes of insider threat attacks and what companies can do to mitigate or even avoid them. In these particularly tumultuous times, when organizations… Continue reading Insider threat does not have to be malicious, so how do you protect your organization?