Securing the Work-At-Home Environment
The new business realities created by the coronavirus pandemic include unprecedented numbers ...
Re-Imagine Endpoint Protection (Even if You Don’t Have EDR)
Enterprise endpoints (laptops, workstations, servers, mailboxes, etc.) have historically ...
Surge in Remote Working Highlights Growing Need for Network Traffic Analytics
As bad actors ramp up phishing campaigns against remote workers, Chief Information Officers ...
Coronavirus Is a New Challenge for Cybersecurity
If you think the COVID-19 epidemic means a respite from cyberattacks against companies, ...
Misconfiguration Remains the #1 Cause of Data Breaches in the Cloud
In a bid to stem the spread of COVID-19 and protect their business, companies are making a ...
More than Half of Enterprises Are Not Equipped to Operate in the Cloud Securely, Study Shows
Most enterprises believe embracing the public cloud is critical to innovation, but few are ...
How Effective are Security Operations Centers?
A lot of organizations rely heavily on their security operations centers (SOCs) to maintain ...
Remote Work in the Covid-19 Era: Cyber Risks Rise for Small Businesses as Security Budgets Dwindle
Business owners are concerned that remote working will lead to more cyberattacks. ...
Don’t Underestimate Spam and Phishing Scams - Pandemic Gives ISPs the Job of SOCs
The COVID-19 epidemic has sent the world into a frenzy. With so many companies choosing to ...
Ransomware Crooks Emboldened by More Payments, Experiments in 'Customer' Experience
A new report out from CyberEdge Group showed that ransomware attacks broke the record books ...
How to Evaluate Competing MDR Service Providers
Managed detection and response services vary widely so carefully evaluate competencies ...
FBI Issues Warning about BEC Scams Using Cloud-based Email Services
Business Email Compromise (BEC) scams are on the rise and have already generated actual ...


