Blog

September 6, 2021
Crumbling Perimeter

Technical Security

Your Perimeter is Disappearing

You security perimeter is disappearing. Find out why and what to do about it
 read more
August 23, 2021
MDR, XDR, SOAR in a datacenter

Technical Security

XDR, MDR, SOAR - Acronyms of Cybersecurity Detection & Response

XDR, MDR, SOAR and more! All the acronyms in cybersecurity explained right here.
 read more
August 4, 2021
Ransomware Costs

Data Breach

The Total Cost of Ransomware - 7 Categories

Ransomware costs a lot more than simply paying the ransom. This blog describes 7 categories of cost, some you may not be thinking of.
 read more
June 24, 2021
Software Bug

Data Breach

Zero Day Exploits: Advanced Cyberattacks

Zero-day vulnerabilities refer to new vulnerabilities that are typically discovered by an independent researcher or “bug bounty hunter” which are then validated by the original developer of the software. It essentially means that the...
 read more
June 10, 2021
Office computers

Audit & Compliance

9 Tips for Detecting and Preventing DDoS Attacks

Distributed Denial of Service (DDoS) attacks are one of the most disruptive cyberattacks and can be incredibly difficult to stop. These attacks are often carried out using a network of Internet-connected machines that flood your network...
 read more
May 20, 2021
Artificial Intelligence

Data Breach

AI Poisoning: What You Need To Know To Protect Your Business

Machine learning provides tremendous benefits for automating repetitive tasks. But what happens when the machine learns (or is “poisoned” with) bad code? That’s the reality IT professionals must be wary of when using artificial intelligence (AI) and...
 read more

join our email list