• January 17, 2023

    Those working in IT grow accustomed to pagers or smart phones going off in the middle of the night. That means they must get dressed, grab a quick coffee, and head into the office to resolve the latest security alerts,...

  • January 12, 2023

    Vendors often fight over whose solution is best. They set up their own tests to prove that they are better than the competition. Unfortunately, vendor sponsored tests sometimes include a certain bias. Say vendor X knows its software works well...

  • January 10, 2023

    Ashley Leonard, CEO of Syxsense, provides his thoughts on the world of cybersecurity and what to expect in 2023. He touches on diverse areas such as Zero Trust, artificial intelligence (AI), cloud-based attack vectors, autonomous endpoints, and the vital need...

  • January 5, 2023

    The Log4j vulnerability burst onto the scene in December of 2021. One cybersecurity firm reported that the flaw was utilized in attacks on more than 40% of global networks, and that more than 100 breach attempts utilized it every minute...

  • January 3, 2023

    A casual glance at the headlines is far from reassuring concerning the state of enterprise security. Whether it is the billions being paid out to criminal gangs, the millions of customers whose personal data was hacked, or the latest vulnerability...

  • December 29, 2022

    The insurance industry is in somewhat of a crisis. Home insurance rates have climbed. Providers are pulling out of the market in some parts of the country. Flood insurance, too, is a major issue. It is mandated in many coastal...

  • December 27, 2022

    A recent Threat Pulse research report from NCC Group found that the highest number of Distributed Denial of Service (DDoS) incidents between January and September 2022 took place in the month of September. This represented a 14% increase and a total...

  • December 22, 2022

    Application Programming Interfaces (APIs) have become ubiquitous in IT. There are now more than 400 billion API calls per month. They enable applications to interact and systems to connect with external services.   Think about the many layers of the networking...

  • December 20, 2022

    Security is always in principle a conversation of trust. Do you trust the vendors providing your company with products and services? This is a question which every company should be continually evaluating and reevaluating as part of their ongoing security...

  • December 15, 2022

    It has become increasingly apparent in recent years that more cybersecurity professionals are needed urgently. But the pace at which new people are trained is tortoise-like in comparison to the hare-like pace of cybercrime. And unlike the popular children’s story,...