7 Ways to Hang Up on Voice Fraud
Thursday, 28 November 2019
Criminals are coming at us from all direction, including our phones. Don’t answer that next call without reading this tips first. 1 of 8 Whether landline or mobile, for work purposes or personal use, phones are part of our everyday lives. Criminals know this, too, so it’s little wonder why voice fraud has been running
- Published in Strategies
4 Comments
Peer product reviews: IT pros evaluate 7 enterprises offerings
Wednesday, 13 November 2019
The internet has changed the way IT leaders make buying decisions. Decision-makers now rely on ratings and review sites to see what other real users think before we buy just about anything. However, in the world of enterprise technology, most of the information online and in your inbox comes from vendors when what you really
- Published in Strategies
7 Ways VPNs Can Turn from Ally to Threat
Saturday, 21 September 2019
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN. 1 of 8 VPNs are critical pieces of the enterprise cybersecurity infrastructure. When it comes to protecting data in motion, there’s really no good
- Published in Threats, Threats Analysis
7 Steps to Web App Security
Wednesday, 04 September 2019
Emerging technologies are introducing entirely new ways to reach, act, and interact with people. That makes app security more important than ever. 1 of 8 For more than two decades, Web apps were built with functionality in mind. Everything revolved around the user interface and how easy it was for users to access information and
- Published in Threats, Threats Analysis
7 Big Factors Putting Small Businesses At Risk
Wednesday, 21 August 2019
Small organizations still face a long list of security threats. These threats and vulnerabilities should be top of mind. 1 of 8 Cybercriminals are increasingly taking aim at smaller organizations. This puts small and midsize businesses (SMBs) in a tough spot. Faced with a long list of cyberthreats, they also are operating with smaller budgets and staff
- Published in Threats, Threats Analysis
7 Biggest Cloud Security Blind Spots
Thursday, 15 August 2019
Cloud computing boon is for innovation, yet security organizations find themselves running into obstacles. 1 of 8 Image Source:Adobe Stock (Sergey Nivens) Cloud computing is evolving from a viable option for delivering IT services to the de facto standard. According to the “2019 Public Cloud Trends” report, from the Enterprise Strategy Group (ESG), the use of
- Published in Threats, Threats Analysis
7 Stats That Show What it Takes to Run a Modern SOC
Thursday, 25 July 2019
An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs). 1 of 8 Image Source: Adobe Stock ( Gorodenkoff) As the nerve center for most cybersecurity programs, the security operations center (SOC) can make or break an organizations’ ability to detect, analyze, and respond to incidents
- Published in Threats, Threats Analysis
7 Ways to Mitigate Supply Chain Attacks
Friday, 28 June 2019
Breaches caused by external vendors and service providers have become a major and escalating problem for organizations. 1 of 8 Image Source: Shutterstock Breaches resulting from third-party security lapses are on the rise. Last year, 61% of surveyed US organizations said they had experienced a breach caused by one of their vendors or another third party. Some
- Published in Threats, Threats Analysis
7 2019 Security Venture Fund Deals You Should Know
Thursday, 20 June 2019
2019 has, so far, been a busy year for venture capitalists in the security industry. Here are 7 funding rounds important because of the technologies or market trends they represent. 1 of 8 Venture capitalists look for the “big win,” not for this week, but for the future. And they stake millions of dollars on
- Published in Threats, Threats Analysis
7 Truths About BEC Scams
Friday, 14 June 2019
Business email compromise attacks are growing in prevalence and creativity. Here’s a look at how they work, the latest stats, and some recent horror stories.
- Published in Attacks