Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry
Technological progress also enhances the danger of cyber threats By C. Max Farrell¸ senior technical marketing specialist & Chiyi Lin, product line manager TXOne Networks Until about ten years ago,…
Too Hot to Handle:The case for Zero Trust and SASE
By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance on legacy systems and solutions. As cybercriminals have evolved their methods, the security adopted…
How to Fix Mid-Market Security Using Intelligent Automation and AI
By Guy Moskowitz, CEO, Coro Market forces are working against medium-sized businesses, leaving companies that don’t have large, dedicated security teams and fat cyber security budgets exposed to cyber threats….
On The Frontline in The War Against Hackers
By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote work, crime is moving from physical space to cyberspace. Businesses are conducting…
Biggest Cyber Trend in 2022
You Can’t Fix Stupid By Guy Rosefelt, CPO, Sangfor Technologies Stop me if you have heard this one: a customer is working late at night, has been a long day,…
Phishing Techniques in Disguise: What to Look for And Why You Should
By Rotem Shemesh, Lead Product Marketing Manager, Security Solutions, at Datto Phishing is a familiar concept to cybersecurity professionals – and hackers. According to a recent study, phishing attacks are…
Directed Analytics – The Future of Data Management
By Simon Rolph, CEO & Founder of Such Sweet Thunder The world as we know it has changed – it’s undisputed. Industries of all kinds face a wholly different landscape…
5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem
Why Organizations Need to Secure Directory Services in a Hybrid Deployment from Attack Paths By Justin Kohler, Director of BloodHound Enterprise at SpecterOps Microsoft Active Directory is one of…
Top 10 Reasons Cyber Defense Firms Should Hire Veterans
Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to the cybersecurity industry By Bryon Kroger, Founder of Rise8 Following the…
Why the Future of Threat Detection and Prevention is Unified Security and Risk Analytics
Why True AI/ML Capabilities are Essential for Next-Gen Risk Analytics By Sanjay Raja, VP of Product Marketing at Gurucul As cloud adoption continues to grow and remote work becomes the…
3 Cybersecurity Certainties for 2022
By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between IT and OT technologies introduced new vulnerabilities that threat actors exploited with shocking frequency…
Have We Learned from Our Past Mistakes to Prevent Future Cyberattacks?
By Marc Packler, President, CISO Advisory, Silent Quadrant Gartner’s article, “The Top Cybersecurity Predictions for 2021-2022,” contains a quote from philosopher George Santayana: “Those who cannot remember the past are…