No data? No hunt. Top tips to ensure a successful threat hunting environment

Threat hunting continues to be a priority for security teams. Many organizations have plans to initiate or expand threat hunting programs. All successful ...

No data? No hunt. Top tips to ensure a successful threat hunting environment

Threat hunting continues to be a priority for security teams. Many organizations have plans to initiate or expand threat hunting programs. All successful threat hunting begins with having the right data to ...

Cybersecurity in the Summer of Uncertainty

What is the new normal for security professionals in the Summer of 2020? Hint: It involves protecting a larger attack surface than anyone ever imagined. Remote Workers Everywhere More employees than ever ...

84% of Businesses Are Likely to Expand WFH Ability Despite Security Risks. Is Remote Work Becoming the New Normal?

Despite the downsides of replacing on-premise work with remote work, 84% of companies anticipate a consistent expansion of remote work practices, according to a 2020 Remote Work-From-Home Cybersecurity Report published earlier this ...

RSA 2020 Conference Recap: 7 Conference Observations from the Floor

RSA 2020 wrapped up last week in San Francisco, and once again, the show floor was buzzing with innovation and swag. While it’s ...

RSA 2020 Conference Recap: 7 Conference Observations from the Floor

RSA 2020 wrapped up last week in San Francisco, and once again, the show floor was buzzing with innovation and swag. While it’s impossible to capture all the sights and sounds of ...

Four Keys to Comprehensive Network Protection

According to IDC, worldwide security spending is expected to hit $133.8 billion by 2022, a CAGR of 9.2% over four years. Despite the ...

Debunking The BlueKeep Exploit Hype – What You Should Know

WannaCry is still fresh in our memory, reminding organizations of how distractive an unpatched vulnerability can be especially if weaponized as a wormable threat that delivers ransomware. BlueKeep has been estimated to ...

Researchers Uncover Threat Actor Supergroup Linked to Stuxnet, Flame, Duqu

Could critical infrastructure attacks be making a comeback? Or did these invisible threats never leave in the first place? Extensive research reveals that as many as four threat actors many have been ...