Archives of #cybersecurity

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems. A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network […]

Cyber-Security Rundown

Learn about the basics of cyber-security and why it’s essential for all enterprises to have a secure cyber-security system.

Email Security that Meets Government Standards

Nation state actors, cyber criminals, hacktivists and other attackers continue to set their sights on government organizations. In 2017 alone, breaches were reported on the federal level at a major military branch, on the state level at a Division of Medicaid and Department of Motor Vehicles, and on the local level at a County Clerk’s […]

Email Security: A Buyer’s Guide

Today’s attackers seem to be using malicious emails more than anything else to infect their targets. Many of these sophisticated, malevolent messages trick users into clicking links, downloading attachments, sharing credentials or taking some action that activates ransomware, installs malware or gives cyber criminals access to business networks. Traditional signature-based and reputation-based defenses such as […]

The Power of Incident Response Technology

…incident response teams can deploy a mix of technologies to meet a customer’s investigative needs, and many of these same technologies have defensive capabilities that help protect the environment against additional attacks during the investigation. Read more about how incident response can help companies develop a quick reaction after a breach:

The Need for Symb-IoT-ic Relationships Across IT and LoB teams in IoT and OT Security

Who is ultimately responsible for protecting Industrial Internet of Things (IIoT) and operational technology (OT) equipment as businesses rush toward digital transformation? All CxOs should be asking their internal teams who are responsible for IT and OT security the same question. Read about the breaches concerning IoT and the importance of cooperation when it comes […]

Cybersecurity is every IT leader’s job

October is National Cybersecurity Awareness Month, a campaign created by the U.S. Department of Homeland Security to reinforce the importance of Internet security. This year, we hardly need reminding. We have the history-making Equifax breach of late September to thank. The breach of the credit reporting company’s repositories compromised personal data of more than 145 million people, […]

The New DDoS Landscape

News outlets and blogs will frequently compare DDoS attacks by the volume of traffic that a victim receives. Surely this makes some sense, right? The greater the volume of traffic a victim receives, the harder to mitigate an attack – right? At least, this is how things used to work. An attacker would gain capacity […]