by Noor Boulos | Oct 11, 2022 | Blog
Good Password Hygiene Mitigates Personal and Business Cyber Risk Noor Boulos In our previous Cyber Security Awareness Month (CSAM) blog we talked about the added value we as cybersecurity practitioners can bring to the table by sharing knowledge we take for granted...
by Noor Boulos | Oct 4, 2022 | Blog
Help Enable Smarter Decisions During Cybersecurity Awareness Month Noor Boulos Do a quick search for the top cybersecurity breaches thus far in 2022 and you’ll quickly be overwhelmed with reports of cryptocurrency thefts, attacks targeting multinational corporations...
by Dave Krasik | Sep 27, 2022 | Blog
Unlock the Power of Automation: Vulnerability Management Dave Krasik We’ve spoken extensively about the importance of taking a data-driven approach to Vulnerability Management. In short the efficiency and effectiveness of vulnerability management processes depend...
by Guest Blog | Sep 21, 2022 | Blog
Spear Phishing Triage Using ThreatQ and TDR Orchestrator Ed Young According to Proofpoint’s 2021 State of the Phish Report, more than 80% of organizations fell victim to a phishing attack last year. Another report from PhishMe found that 91% of cyberattacks start...
by Marc Solomon | Sep 8, 2022 | Blog
Organizations are traveling the road to cybersecurity automation, but it is not a smooth journey Marc Solomon Our latest industry research – ‘The 2022 State of Cybersecurity Automation Adoption’ – which we have undertaken for the second year running and...
by Chris Jacob | Sep 6, 2022 | Blog
Unlock the Power of Security Automation: Threat Intelligence Management Chris Jacob Threat intelligence has become a significant input to the overall ecosystem that organizations leverage in their security footprint. Managing that data and the contextualization...