Infosecurity Blogs
Capitalizing on a Crisis: What Global Events Mean for Cybersecurity
Cyber threats emanating from the Russia Ukraine are widespread and indiscriminate, and organizations must be prepared
OWASP Shines Light on Three New Risk Categories
Security teams must consider the new categories when looking to protect against today’s application security risks
Cloud Services Are Increasingly Exploited for Command and Control in Cyber Espionage Operations
Threat actors are making the most of cloud services for malicious purposes, so organizations should do the same for their security
OWASP Gives App Security a Fresh Look
Non-profit revamps methodology for top 10 list to reflect new risks and challenges posed by remote work
Credential Harvesting and Initial Access: What Are They and How Can I Hit Back?
Credential theft is a key element of initial access, and security teams must spot and respond to such activity rapidly
Time to Gear Up Your Company's Cybersecurity
It's becoming impossible to ignore the need for additional layers of security
Why We Expect More Multi-Level Extortion (And What to Do About It)
Why it matters to small to mid-sized enterprises and what IT and Security stakeholders can do about it
Ransomware Is On The Rise: Here’s How To Stay Protected
Ransomware is a mounting threat, but that doesn’t have to mean your organization is the next to be breached
Understanding DDoS Protection Options
It's vital to understand the topology, advantages and disadvantages of different DDoS protection options
Let’s Go Bold in Pursuit of Cyber Talent
From both recruitment and retention standpoints, there is much companies can do to calibrate their approaches for current realities
How Threat Hunting Evolved In 2021
Threat hunting has been pushing to new limits since 2021, but what are the major developments that have allowed it to thrive?
Emotet Is Back and Is Deadlier Than Ever! A Rundown of the Emotet Malware
Despite the dangers, businesses can protect their servers from being infected with proper precaution
HEAT: Are Companies Prepared for Modern Threats?
To deal with HEAT, security strategies today can no longer be founded in detection and remediation
Protecting Industrial Organizations From Ransomware
Industrial networks are far more connected than ever, which has significantly increased security stakes
The Digital Heatwave: Understanding Highly Adaptive Evasive Threats
To stop HEAT attacks and limit the devastating effects of ransomware, security teams need to update their defenses
How to Navigate the Complexity of SaaS Management
Why a comprehensive SaaS management solution is imperative for business success
The Rise of VR and the Transformation of the Cybersecurity Capability
Designing cybersecurity of the future requires a willingness to explore how technology trends manifest
Serverless Applications Pose Unique Challenges for Security Testing
To actualize the benefits of serverless applications, organizations need purpose-built application testing
Tales from the SOC: Inactive Account Exploitation
How did the SOC team react when a malicious threat actor gained credentials of an ex-employee?
Why Multi-Factor Authentication Isn't Enough To Secure Enterprises
Why the best security is knowledge and understanding coupled with layers of technical security