Holger picture

Now is the Time To Rethink Your BYOD Security Strategy: Q&A with Cybersecurity Insiders Founder, Holger Schulze

As more companies embrace the Bring Your Own Device (BYOD) movement to accommodate a rapidly evolving workforce, one question comes to mind: How are IT and security leaders handling this sudden wave ...
6.22.21 Blog - Blank

Ignorance is Bliss… for Hackers

Imagine standing in front of the CEO and company board of directors, asking them for a check for an obscene amount of money to pay off hackers that are holding critical data ...
6.9.21 Blog - Social

Will New Executive Order on Cybersecurity Fast Track Zero Trust?

On May 12, US President Biden issued a landmark executive order on Improving the Nation’s Cybersecurity that signals the need for governments and enterprises alike to boost their cyber defenses around the ...
SaaS and BYOD Malware or ATP

Malware in the Cloud: Odds Are You’re Infected

Malware attacks increased by 358% in 2020, while ransomware attacks, in particular, increased by 435%. Additionally, malware is targeting cloud apps more than ever before, and, at any given moment, 44% of ...
OAuth, XSS, Google WhiteSource Log4j Deepfence threat report

Threat Report: Cybercriminals Expand Vertical Focus

The annual Threat Report published by BlackBerry Limited finds that while financial services and the retail sector continue to bear the brunt of most cybersecurity attacks, cybercriminals have expanded their targets in ...
Security Boulevard
Swimlane & Cylance PROTECT: Endpoint Threat Response

Swimlane & Cylance PROTECT: Endpoint Threat Response

Swimlane and Blackberry Cylance have partnered to offer a new use case that combines the power of security orchestration, automation and response (SOAR) with Cylance PROTECT’s integrated threat prevention solution. The Proactive ...
Proactive Endpoint Threat Response with Swimlane & Cylance PROTECT

Proactive Endpoint Threat Response with Swimlane & Cylance PROTECT

Swimlane and Blackberry Cylance have partnered to offer a new use case that combines the power of security orchestration, automation and response (SOAR) with Cylance PROTECT’s integrated threat prevention solution. The Proactive ...
Swimlane & Cylance PROTECT: Endpoint Threat Response

Swimlane & Cylance PROTECT: Endpoint Threat Response

| | Cylance, EDR, Use Cases
Swimlane and Blackberry Cylance have partnered to offer a new use case that combines the power of security orchestration, automation and response (SOAR) with Cylance PROTECT’s integrated threat prevention solution. The Proactive ...
IoT Log4j Exchange ProxyLogon OT PKI IoT security

Blackberry Acquires Cylance to Apply AI to IoT Cybersecurity

Blackberry today announced it is spending $1.4 billion to acquire Cylance, a provider of cybersecurity software based on mathematical models, to extend the reach of its security portfolio into the realm of ...
Security Boulevard

Spy Apps and Stalkerware with Special Guest Jeff Tang – WB40

This is your Shared Security Weekly Blaze for October 29th 2018 with your host, Tom Eston. In this week’s episode: Spy apps and Stalkerware with special guest Jeff Tang. Silent Pocket is ...