off

Cyber Security Strategy: The Quest for Visibility and Threat Hunting

There’s currently so much emphasis in the cyber security market space on after-the-fact visibility into what bad things just happened. So much energy, time, money, strategy and dialogue about it, writes Scott Scheferman. The trouble is, it comes at a cost. For every moment...
Posted On 21 Jan 2020
Patrice Puichaud
off

How Does Ransomware Work?: Beating the Cyber Criminals

Threats come and go, but one thing remains the same: the ability of cyber criminals to adapt to circumstances. A brief decline of interest in ransomware as criminals focused their attention on cryptojacking during the previous year appears to have come to an end and ransomware...
Posted On 29 Aug 2019
off

Verizon’s 2019 Data Breach Investigations Report outlines scale of current cyber threat

C-Level executives with access to a company’s most sensitive information are now the major focus for social engineering attacks. According to Verizon’s 2019 Data Breach Investigations Report, senior executives are 12 times more likely to be the target of social incidents...
Posted On 09 May 2019