• June 12, 2021

    The Number of Ransomware Victims is Greatly Underreported Is the number of ransomware victims accurate? It seems hard to believe that ransomware numbers are underreported. After all, hardly a week goes by without news of another high-profile victim. And most...

  • June 2, 2021

    Would Hamlet Pay a Ransom?  Would Hamlet Pay a Ransom? Hamlet once pondered, “To be, or not to be. That is the question.” If the Prince of Denmark lived in the modern world, he is more likely to be pondering...

  • February 12, 2021

    How Syxsense Would Respond to the Florida Water Poisoning Attack Hackers Attempt Poisoning in Florida Last week an unidentified attacker gained access to a water treatment plant's network and modified chemical dosages to dangerous levels. The FBI has issued an...

  • June 26, 2020

    COVID-19 Causes Increase in Cyberattacks Coronavirus is Leading to Growth in Cyber Attacks As the world continues to battle COVID-19, patching and securing endpoints has become a much bigger challenge for businesses. A recent survey from Threatpost revealed that 40% of...

  • May 8, 2020

    The True Cost of DoS Attacks A Denial of Service (DoS) attack can seriously derail any business with a digital presence. These attacks are still prevalent in 2020 and the cost is rapidly rising. Even a small company could lose...

  • March 4, 2020

    Why You Need to Manage Your Endpoints Endpoint Management is More Critical than Ever Not every security or IT team has a confident endpoint management strategy. A recent survey of 1,000 IT professionals found that, while 88 percent of respondents...

  • February 6, 2020

    Why Endpoint Detection and Response is Getting Harder in 2020 The demand for endpoint detection and response solutions across the globe is currently quite strong, with no signs of slowdown any time soon: Recent research by London-based firm Technavio predicts...

  • February 3, 2020

    How Deadly is Ransomware and How Effective are the Protections Against It? Picture the following scenario for a moment: It's a seemingly typical day at the office for your business. People are busy and coffee-driven. Everything is unfolding as it...

  • February 27, 2019

    Why Realtime Security is Crucial This article originally appeared on TechWormCyberattacks are rapidly growing as a global threat. With more complex and powerful attacks, actors are in a control of massive amounts of resources, including username and password data dumps...

  • February 19, 2019

    10 Ways To Protect Your Organization From Cyberattacks This article originally appeared on ypo.org.Many CEOs don’t want to think about cybersecurity. That’s why you hire a chief technology officer (CTO) or chief information security officer (CISO). But cybersecurity is now...