Threat intelligence data has become more and more crucial to effective enterprise security practices. Threat intelligence solutions gather raw data and indicators about existing and emerging threat actors and threats. This data is then analyzed with the hope of informing and preparing organizations for cybersecurity risks like zero-day risks, threat actor attacks, advanced persistent threats, and the exploitation of known vulnerabilities. Many organizations view threat intelligence exclusively in this context.
Three Ways to Defeat Ransomware
Ransomware is very difficult to stop, mostly because the attackers are adept at locking up a network long before anybody in an organization even sees a ransom note. In many attacks, the malware combines an encryption payload with automated propagation.
3 Steps Security Leaders Can Take Toward Closing the Skills Gap
Much has been written about the Great Resignation as its impact is widespread. Sectors including hospitality, food, retail, manufacturing and healthcare have all been affected, making access to goods and services we took for granted hard to come by.
Are You Prepared for 2022’s More Destructive Ransomware?
We’re barely into 2022, and already we’re seeing ransomware proliferate. What we saw last year is that while most attacks continue to exploit known vulnerabilities, cybercriminals have also redoubled efforts to target new ones – such as what we saw with Hafnium and new Microsoft Exchange vulnerabilities.
COVID’s Silver Lining: The Acceleration of the Extended IoT
The SASE Conversation in 2022, a Resolution for the Future
Bridging the Gap Between Training and Behavior
While employees want to do the right thing when it comes to protecting their organization from cyber threats, we cannot expect them to be perfect
Think Big, Start Small, Move Fast: Applying Lessons From The Mayo Clinic to Cybersecurity
I have previously written about how much the Mayo Clinic impacted my life through my experience and time there. In that article I discussed their approach to multi-disciplinary patient triaging and how looking at patients as a whole, rather than a system of discrete systems, helps them to make the right decisions.
The Third Building Block for the SOC of the Future: Balanced Automation
When automation is balanced between humans and machines, we can ensure teams always have the best tool for the job
In the Hacker’s Crosshairs: K-12 Schools
In education, cybersecurity is rarely top-of-mind — until a major incident occurs. Yet, according to the Federal Bureau of Investigation (FBI), schools are top targets for cybercriminals, resulting in ransomware attacks, data theft, and the disruption of online learning.