7 Research Insights to Help Inform Your Approach to Network Security
In their survey of security-focused professionals, Osterman Research came away with some key network security insights worth sharing ... Read More

Characteristics and Challenges of Advanced Persistent Threats (APTs)
Advanced Persistent Threats (APTs) are sophisticated, often multi-component network attacks that, by definition, often go undetected for quite some time ... Read More
What Does Your Current Security Infrastructure Look Like?
Commissioned research shows that more security influencers and decision makers want security infrastructure that goes beyond what they currently have in place ... Read More
C-Level Security Compliance – The Need for Communication and Automation
While C-level executives may feel they are in compliance, the lack of communication with them can spell trouble. Could cybersecurity automation be the answer? ... Read More
Healthcare Organizations Continue to be a Soft Target for Phishing Attacks
The 2019 data breach numbers for the healthcare industry drive home both the lack of focus on phishing security and the obvious need for it ... Read More
FBI Alerts that 2FA is Bypassed by Phishing Attacks
The FBI recently delivered a Private Industry Notification (PIN) in which it pointed to phishing attacks and two new hacker tools that can bypass two-factor authentication ... Read More
10 New Approaches to Help Organizations Improve Phishing Security – Part Two
Here are the remaining 5 new approaches for helping organizations improve their phishing security. The threat landscape is changing… are you? ... Read More
10 New Approaches to Help Organizations Improve Phishing Security – Part One
Here are the first 5 of 10 new approaches for helping organizations improve their phishing security. Come back for the remaining 5 in a future blog post ... Read More

Malvertising on Legitimate Websites, Even The New York Times
SlashNext recently discovered a new malicious phishing URL distributed through Google ads being served on the The New York Times website ... Read More
Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs
Most social engineering attack signs are really indicators for basic attacks from less experienced and sophisticated hackers. Today’s attacks are more sophisticated ... Read More