Digital Transformation Shouldn’t Require a Security Transformation
It’s often asked, why can’t security innovate more?
It's Time Security Teams Begin Prep for Quantum Computing
It seems that every week new news breaks regarding the progress toward reaching practical ...
Abusing Legitimate Software to Avoid Detection – ‘NAIKON’ APT Caught Running Cyber-Espionage Campaign Against Asian Military Organizations
Advanced Persistent Threat (APT) groups are at the heart of today’s cyber-espionage efforts. ...
Infrastructure Attack Highlights That Ransomware Operators Are Aiming for Business Disruption
Ransomware continues to be the ultimate business disruptor. This week Colonial Pipeline, a ...
How can the MITRE Engenuity ATT&CK® EVALUATIONS help you reduce cybersecurity operational cost
Security operations are expensive! Hiring, training, and keeping a team of security analysts ...
Defending against Email Threats that Don’t Involve Malware
phisThe threat landscape continues to evolve in terms of complexity Email is still the ...
The Data Privacy Imperative—Organizations Worldwide Work Toward Being Compliant
Ensuring data privacy is now a worldwide concern, with many countries adopting data ...
The Curse of Telnet, an IoT Problem that Doesn't Want to Go Away
An unsecure communication protocol proves to be a headache in today's world Despite its age ...
Decoding the MITRE Engenuity ATT&CK® EVALUATIONS 2021 Results
On April 20th, the results of the latest round of the annual MITRE ATT&CK® Evaluation of ...
Content is Key, but Is Also a Door for Spreading Malware
Since the onset of the current health crisis, many systems have found themselves strained. ...
Considering Endpoint Detection and Response? What’s the best EDR choice for your business?
“We are our choices” (John Paul Sartre)
Considering McAfee Alternatives? Make Replacement an Upgrade
“When in doubt, choose change.” (Lily Leung) McAfee has agreed to sell its enterprise ...