7 Research Insights to Help Inform Your Approach to Network Security

In their survey of security-focused professionals, Osterman Research came away with some key network security insights worth sharing ... Read More
â„¢

Characteristics and Challenges of Advanced Persistent Threats (APTs)

Advanced Persistent Threats (APTs) are sophisticated, often multi-component network attacks that, by definition, often go undetected for quite some time ... Read More

What Does Your Current Security Infrastructure Look Like?

Commissioned research shows that more security influencers and decision makers want security infrastructure that goes beyond what they currently have in place ... Read More

C-Level Security Compliance – The Need for Communication and Automation

While C-level executives may feel they are in compliance, the lack of communication with them can spell trouble. Could cybersecurity automation be the answer? ... Read More

Healthcare Organizations Continue to be a Soft Target for Phishing Attacks

The 2019 data breach numbers for the healthcare industry drive home both the lack of focus on phishing security and the obvious need for it ... Read More

FBI Alerts that 2FA is Bypassed by Phishing Attacks

The FBI recently delivered a Private Industry Notification (PIN) in which it pointed to phishing attacks and two new hacker tools that can bypass two-factor authentication ... Read More

10 New Approaches to Help Organizations Improve Phishing Security – Part One

Here are the first 5 of 10 new approaches for helping organizations improve their phishing security. Come back for the remaining 5 in a future blog post ... Read More
Malvertising on Legitimate Websites, Even The New York Times

Malvertising on Legitimate Websites, Even The New York Times

SlashNext recently discovered a new malicious phishing URL distributed through Google ads being served on the The New York Times website ... Read More

Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs

Most social engineering attack signs are really indicators for basic attacks from less experienced and sophisticated hackers. Today’s attacks are more sophisticated ... Read More