by Celine Gajnik | Nov 8, 2022 | Blog
Budget and momentum are key to cybersecurity automation maturity – and CISOs are feeling left behind Céline Gajnik, Global Marketing Director As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a...
by Guest Blog | Nov 1, 2022 | Blog
TIPs to Measure your CTI Program Ramiro Céspedes Nowadays, organizations are exposed to a high volume of security related information. Unfortunately, most of these organizations have little to no capabilities of using this information in a proactive manner, i.e. using...
by Chris Jacob | Oct 25, 2022 | Blog
Wrapping up CSAM 2022 with Vulnerability Management Advice for Everyone Chris Jacob As we wrap up Cybersecurity Awareness Month (CSAM) 2022, the final topic we’ll cover is updating software and patching vulnerabilities. According to the 2022 Data Breach Investigations...
by Leon Ward | Oct 18, 2022 | Blog
Phishing Scams Have Reached New Heights: How to Improve Detection and Response Leon Ward The Anti-Phishing Working Group (APWG) Phishing Activity Trends Report reveals that in Q2 of 2022 there were 1,097,811 total phishing attacks. This marks the worst quarter...
by Noor Boulos | Oct 11, 2022 | Blog
Good Password Hygiene Mitigates Personal and Business Cyber Risk Noor Boulos In our previous Cyber Security Awareness Month (CSAM) blog we talked about the added value we as cybersecurity practitioners can bring to the table by sharing knowledge we take for granted...
by Noor Boulos | Oct 4, 2022 | Blog
Help Enable Smarter Decisions During Cybersecurity Awareness Month Noor Boulos Do a quick search for the top cybersecurity breaches thus far in 2022 and you’ll quickly be overwhelmed with reports of cryptocurrency thefts, attacks targeting multinational corporations...