7 Powerful Pointers to Help Thwart Email-Based Attacks

July 12, 2017 | Dan Kaplan

While alternative options for functional communication channels are steadily ...

How Small Retailers Can Take Their Cybersecurity from Zero to 60

June 30, 2017 | Guest Post

A laundry list of major companies of which you've almost certainly been a ...

How to Defend Your Industrial Control Systems: 8 Practical Steps

June 27, 2017 | Dan Kaplan

Ask virtually any security expert to name the most nightmarish scenario related ...

Incident Response Orchestration: What Is It and How Can It Help?

May 30, 2017 | Julia Kisielius

The other day, I invited about twelve friends to my apartment for dinner—on a ...

What to Do When You‘re Getting Phished but Have No Idea Because It Looks Totally Authentic

May 04, 2017 | Dan Kaplan

A "huge, startlingly fast-moving, and perplexing" phishing attack made its way ...

Hybrid Cloud Security, Part III: A New Approach to Threat Detection in the Cloud

March 21, 2017 | Danielle Russell

I started rock climbing about five years ago with top ropes. I learned how to ...

Centralized Logging in the Cloud

March 14, 2017 | Danielle Russell

Centralized logging is essential to network security and compliance reporting. ...

How to Thrive as a CISO in 2017

January 05, 2017 | Dan Kaplan

The job of a cybersecurity executive is a test in resilience and ...

UX Design: An Overlooked Aspect of Endpoint Security

January 04, 2017 | Kim Crawley

People in information security know to heed the advice of Bruce Schneier. What ...

10 Ways You and the Board Should Share the Security and Risk Burden

December 08, 2016 | Dan Kaplan

Never mind sophisticated hackers, advanced attacks or naïve employees, one of ...

How You Can Help Dodge a Web Application Attack

December 06, 2016 | Dan Kaplan

Despite the rise of emerging technologies like cloud and mobile - and the ...

Why Point-of-Sale Malware Isn’t Going Away – And What You Can Do About It

December 05, 2016 | Dan Kaplan

Many shoppers are now doing as much dipping of their credit and debit cards as ...

14 E-Commerce Cybersecurity Pointers to Survive the Holidays

November 16, 2016 | Dan Kaplan

Before the holiday cheer can arrive, online retailers must face the usual ...

Introducing the Managed Security Services Provider Decision Guide

August 11, 2016 | Dan Kaplan

If you're like me, you hate making decisions. This explains why, for example, I ...

Firewall Egress Blocking and Monitoring

July 20, 2016 | Scott Mace

Firewalls. We all have them. We all know we use them to keep unwanted stuff out ...

Did You Forget to Migrate Off Windows Server 2003?

July 20, 2016 | Dan Kaplan

Eighteen percent of businesses are still running Windows Sever 2003, the server ...

When Your CEO Isn't Your CEO: 4 Ways to Help Avoid the Scam

July 07, 2016 | Dan Kaplan

Business executives have long served as optimal marks for digital con artists. ...

How to Better Secure the Endpoint: 5 Elements of a Successful Strategy

June 23, 2016 | Dan Kaplan

Endpoints are everywhere and, at the same time, nowhere. Whether it is a laptop ...

How to Stay on Top of the EU General Data Protection Regulation

June 08, 2016 | Jane Dotsenko

New data protection rules in the European Union have now been published after ...

9 Powerful Ways to Help Prepare for a Data Breach

May 10, 2016 | Dan Kaplan

Do you ever have that dream where you're back in college and you've somehow ...

5 Highly Effective Ways for Law Firms to Protect Client Data

March 30, 2016 | Jane Dotsenko

Cybercrime is evolving rapidly and targeting all types of businesses. Where ...

What to Do About Social Engineering and POS attacks in the Hotel Industry

March 21, 2016 | Jane Dotsenko

Think about your average hotel lobby on a busy day. Likely there will be ...

Why Cybersecurity in the Hotel Industry Should be a Joint Effort

February 10, 2016 | Jane Dotsenko

Recent cybercrime headlines in the hospitality industry should make for ...

How to Stay One Step Ahead of Retail Hackers

January 20, 2016 | Jane Dotsenko

They are glorified in Hollywood as unbeatable masterminds, and ubiquitous in ...

Our Top 10 Most Read Blog Posts of 2015

December 31, 2015 | Dan Kaplan

The security landscape has so much to give in terms of subject matter that is ...

A 3-Step Security Action Plan for Financial Firms

December 21, 2015 | Jane Dotsenko

The finance sector is a prime target for cybercrime and appears fourth in the ...

7 Fundamental Ways to Repel Ransomware

December 11, 2015 | Dan Kaplan

Let's put aside for a moment the mega data breaches that resulted in millions ...

Distributed Denial of Service Attacks: Protection Methods and Best Practices

December 10, 2015 | Garrett Gross

In two recent blog entries, I discussed botnets — best practices in botnet ...