Endpoint
23% of Windows in Use is Old, Insecure Win7 or XP
Windows 7 and XP are obsolete, but that hasn’t stopped almost a quarter of Windows users using them. It’s a security nightmare waiting to happen ...
Windows Virtual Desktop vs Citrix
Let’s compare Windows Virtual Desktop vs Citrix Virtual Apps and Desktops across several key dimensions: system requirements, cost efficiency, accessibility for small to medium businesses, and administration experience required. System Requirements Windows ...
Four Days to the Election— Don’t Fall for These Phishing Scams
With the Presidential election just a few days away, bad actors are ramping up their efforts to lure in victims with phishing attacks designed to harvest credentials and personal information that could ...
What Is Proactive Cyber Defense?
It’s not hard to understand the concept of proactive cyber defense: acting in anticipation of an attack against a computer or network. The goal is getting in front of attacks by evading, ...
Secure Your Digital Life During Cybersecurity Awareness Month
For many, the term cybersecurity conjures images of competing hackers hunched over their laptops, furiously typing in dimly lit rooms until one of them shouts, “I’m in!” At which point, missile defense ...
Cybereason Backs Its Protection with $1 Million Breach Protection Warranty
Every security vendor believes that their product solves a problem and helps customers protect against a breach, exploit, or compromise. However, not every vendor is confident enough in their ability to deliver ...
New Report on Police Decryption Capabilities
There is a new report on police decryption capabilities: specifically, mobile device forensic tools (MDFTs). Short summary: it’s not just the FBI that can do it. This report documents the widespread adoption ...
How to Spin Up a Robust BYOD Security Strategy for your Growing Remote Workforce
Before the pandemic, the trend of remote work had been slowly increasing. Most companies assumed employees would be working from the office most of the time. Similarly, some companies allowed employees limited ...

