Getting Your Security Program to Shift Left: Operationalizing Security Controls via DevSecOps

DevSecOps is a hot topic. It’s touted as a utopia where automation saves time and money while cutting risk and reducing dependencies. In reality, without effective oversight, DevSecOps leaves orphaned technologies, unmaintained ...
MSP Cybersecurity: Best practices for mitigating targeted ransomware attacks

MSP Cybersecurity: Best practices for mitigating targeted ransomware attacks

Ransomware mitigation strategies for MSPs. Learn why ransomware groups target MSPs and what MSPs can do to secure internal and client endpoints. The post MSP Cybersecurity: Best practices for mitigating targeted ransomware ...
Improve Outbound Email with SPF, DKIM, and DMARC

Improve Outbound Email with SPF, DKIM, and DMARC

“Oh sorry, I missed your email. It got dropped into my SPAM folder for some reason.” Isn’t that frustrating? All you did was send over a proposal and it got dropped into ...
How to protect your business against coronavirus-related cyberattacks

How to protect your business against coronavirus-related cyberattacks

We discuss why businesses must have a strong cybersecurity strategy in place, what the most common fraud practices are and how they can protect themselves ...
How to protect your business against coronavirus-related cyberattacks

How to protect your business against coronavirus-related cyberattacks

We discuss why businesses must have a strong cybersecurity strategy in place, what the most common fraud practices are and how they can protect themselves ...

Time to Tighten Up Cybersecurity to Fight Tax Fraud

We’ve described cyber criminals as opportunists many times. They’re adept at leveraging big events―from natural disasters to holidays―to their advantage. Like it or not, tax season is one such event that shows ...

A Look Forward to 2020 and a New Decade of Cybersecurity Threats

Cybersecurity has become a chess match (albeit a fast-paced version) between enterprises and online criminals as they to try to out-maneuver one another. Staying up to date on the latest cyber threats ...

Why You Need a Software Bill of Materials More Than Ever

Imagine that a new vulnerability in lodash was just announced. Applications using the npm package are being exploited through large scale automated DoS attacks. You need to act quickly to understand if ...
Inside The First Amazon Go Store

Facial recognition technology benefits: much more than unlocking smartphones

Facial recognition is no longer limited to security and authentication. Here, we look at other instances where facial recognition is bringing benefits to the community ...
Face/Off: Security challenges in the age of facial recognition

Face/Off: Security challenges in the age of facial recognition

Facial recognition faces its share of security threats but with constant evolution in the technology, it’s rapidly fighting back against these flaws ...