Protecting the Remote Workforce
RaaS kits will be a problem in 2024
In the first three quarters of 2023, the number of ransomware attacks increased by almost 70% compared to the first three quarters of 2022, according to a report from Apple.. Ransomware attacks ...
Browser security is the key to stopping ransomware attacks
Ransomware continues to frustrate enterprise security teams. These advanced attacks use adaptive and evasive tactics to bypass traditional security tools, infiltrate endpoints, spread through the network, and deliver their harmful payloads. More ...
The Browser Grinch strikes again: A tale of Chrome security updates
‘Twas the season to be jolly, but lurking in the digital shadows was the Browser Grinch. Chrome’s recent zero-day vulnerability (CVE-2023-7024) crashed the holiday party, echoing the chaos of Microsoft’s 2018 emergency ...
5 things to consider when evaluating effective browser security
It’s no secret that the way we work has fundamentally changed over the past five years. Most work – whether it’s communicating with customers or fulfilling procurement requests – is conducted in ...
5 keys to effective web browser visibility
Users are trusting by nature. They assume that if they are able to access a site or application on the Internet, it must be safe. If it wasn’t, the conventional wisdom goes, ...
Breaking the misconception: Unveiling AI’s impact on browser security
To say artificial intelligence (AI) has been a buzzword in the security industry is a massive understatement. One thing’s for sure, there are often misconceptions surrounding AI’s true potential. In a recent ...
Real-world examples of Highly Evasive Adaptive Threats (HEAT) in the news
Despite some good news from the recently released 2023 CyberEdge Cyberthreat Defense Report (CDR), high-profile breaches continue to plague the industry. From Rackspace to Twitter to GitHub, businesses, organizations and government agencies ...
The illusion of safety: Unmasking evasive browser attacks for a secure cyber landscape
Security used to be pretty straightforward. Enterprises would build a strong perimeter defense in front of a robust data center and shore up entry points into the network—ensuring that malicious actors couldn’t ...
Is RBI the key to the White House’s new cybersecurity strategy?
The Biden administration announced a new national cybersecurity strategy earlier this month. As digital transformation continues to radically change how the country lives, works, communicates and plays, the new federal cybersecurity strategy ...
Federal-level web security for K-12 schools: Isolation holds the key
I recently had an opportunity to catch a fascinating talk by Alaina Clark, assistant director for stakeholder engagement for Cybersecurity and Infrastructure Security Agency (CISA). A trusted advisor for security professionals in ...