What are BEC scams and how to avoid them

February 09, 2022 | David Balaban

This blog was written by an independent guest blogger.

Unraveling the climate change and Cybersecurity connection

February 08, 2022 | Bernard Brode

This blog was written by an independent guest blogger.

Webinar - The Age of MSSPs: Uncovering the Why’s of Managed Services

February 07, 2022

With security risks continuously mounting and the threat landscape evolving at ...

Information systems and cybersecurity: Connections in UX and beyond

February 07, 2022 | Devin Morrissey

Image source: Pexels

Data Assessment in Healthcare: Knowing What Data You Have Is Half the Battle

February 04, 2022 | Don White

When it comes to protecting personal healthcare information or a medical ...

Using KPIs to generate results in Cybersecurity

February 03, 2022 | Shannon Brewster

Gaining investment from business leaders to create a mature cybersecurity ...

The ultimate guide to Cyber risk management

February 02, 2022 | Irfan Shakeel

This blog was written by an independent guest blogger.

Mitigating Third-Party Vendor Risk in Your Supply Chain

February 01, 2022 | Jessica Charter

A recent survey by the analyst firm Gartner, showed that 89% of companies ...

Quantum computing brings new security risks: How to protect yourself

February 01, 2022 | Theodoros Karasavvas

This blog was written by an independent guest blogger.

6 Tips for Supply Chain Risk Management in 2022

January 31, 2022 | Henry Ward

Forrester recently predicted that in 2022, 60% of security incidents would ...

Stories from the SOC - WannaCry malware

January 31, 2022 | Ian Schlesinger

Stories from the SOC is a blog series that describes recent real-world security ...

How Data Privacy Has Evolved in the Age of the Breach

January 28, 2022 | Luke Kenny

As Data Privacy Day once again rolls around, we can look back at some healthy ...

M&A Trending In Cybersecurity Industry Vertical For 2022

January 28, 2022 | Chuck Brooks

This blog was written by an independent guest blogger.

DevSecOps plan process

January 27, 2022 | Keith Thomas

In the DevOps and DevSecOps Introduction, What is DevOps, we reviewed how our ...

Stories from the SOC - Inactive Account Exploitation

January 24, 2022 | Alex Galindo

Stories from the SOC is a blog series that describes recent real-world security ...

NFTs - Protecting the investment

January 20, 2022 | Karoline Gore

This blog was written by an independent guest blogger.

Log4j: How a Single Vulnerability Can Affect Multiple Systems

January 19, 2022 | Rob Horne

There are truisms that span history. One truism is that a single mistake can ...

Exploring influences on SSC grades for insurance companies

January 19, 2022 | Nahla Davies

This blog was written by an independent guest blogger.

When It comes to Cybersecurity - An ounce of prevention

January 18, 2022 | Tim Hazzard

Benjamin Franklin advised fire-threatened Philadelphians in 1736 that, “An ...

Russia’s FSB Takes Down REvil Cyber Gang in an Unprecedented Series of Raids

January 14, 2022 | Ziv Mador

Reuters reported on Friday that the Russian Federal Security Service (FSB) and ...

How to Outplay the Ransomware Playbook

January 13, 2022 | Darren Van Booven

Organizations across industries are increasingly concerned about their ...

Is Fighting Cybercrime a Losing Battle for Today's CISO?

January 12, 2022 | Theresa Lanowitz

At times, the quest to stay on top of web application security can seem futile. ...

FIN7 Sends BadUSB Devices to U.S. Businesses as Part of Targeted Ransomware Campaign

January 11, 2022 | Karl Sigler

First reported by The Record, the FBI has issued a new security Flash Alert ...

Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

January 11, 2022 | Lisa Ashjian

Enterprises know they need defenses integrated into each aspect of their ...

Multi-Factor is incomplete without backup codes

January 10, 2022 | Bob Covello

This blog was written by an independent guest blogger.

CISO's Corner: The Four Best Cybersecurity Investments You Can Make During the Cyber Talent Shortage

January 06, 2022 | David Bishop

The need for strong cybersecurity has reached critical mass. Seventy-six ...

Endangered data in online transactions and how to safeguard company information

January 06, 2022 | Samantha Clark

This blog was written by an independent guest blogger.

LevelBlue teams up with Cisco to create new managed SASE offering

January 05, 2022 | Will Eborall

Whether organizations call it digital transformation or just using technology ...