• January 10, 2023

    Ashley Leonard, CEO of Syxsense, provides his thoughts on the world of cybersecurity and what to expect in 2023. He touches on diverse areas such as Zero Trust, artificial intelligence (AI), cloud-based attack vectors, autonomous endpoints, and the vital need...

  • January 5, 2023

    The Log4j vulnerability burst onto the scene in December of 2021. One cybersecurity firm reported that the flaw was utilized in attacks on more than 40% of global networks, and that more than 100 breach attempts utilized it every minute...

  • January 3, 2023

    A casual glance at the headlines is far from reassuring concerning the state of enterprise security. Whether it is the billions being paid out to criminal gangs, the millions of customers whose personal data was hacked, or the latest vulnerability...

  • December 29, 2022

    The insurance industry is in somewhat of a crisis. Home insurance rates have climbed. Providers are pulling out of the market in some parts of the country. Flood insurance, too, is a major issue. It is mandated in many coastal...

  • December 27, 2022

    A recent Threat Pulse research report from NCC Group found that the highest number of Distributed Denial of Service (DDoS) incidents between January and September 2022 took place in the month of September. This represented a 14% increase and a total...

  • December 22, 2022

    Application Programming Interfaces (APIs) have become ubiquitous in IT. There are now more than 400 billion API calls per month. They enable applications to interact and systems to connect with external services.   Think about the many layers of the networking...

  • December 20, 2022

    Security is always in principle a conversation of trust. Do you trust the vendors providing your company with products and services? This is a question which every company should be continually evaluating and reevaluating as part of their ongoing security...

  • December 15, 2022

    It has become increasingly apparent in recent years that more cybersecurity professionals are needed urgently. But the pace at which new people are trained is tortoise-like in comparison to the hare-like pace of cybercrime. And unlike the popular children’s story,...

  • December 13, 2022

    We hosted Howard Holton, Analyst & CTO at GigaOm, to discuss the state of the industry, the future of patch management, and how to use the latest GigaOm Radar to find the right solution for you. In this session you’ll learn:...

  • December 13, 2022

    The FBI’s 2021 Internet Crime Report named business email compromise (BEC) as the most effective weapon in the cybercrime arsenal. It accounted for third of the country’s $6.9 billion in cyber losses that year and is expected to rake in...