Blog
Latest Post
Next-Gen Cyber security: Harnessing AI for Advanced Threat Prevention
Artificial Intelligence is the long awaited tech that cybersecurity has needed against all kinds of digital threats. With evolution from the traditional security approaches, it has given birth to threat prevention mechanisms that are cost-effective and robust. Most...
Recent
The Pillars of Email Security: Encryption, Filtering, and Training
In corporate America, email is still the go to for communication. It also remains the top threat vector for hackers to gain entry.. The tactics of cyber criminals are evolving every day. Organizations must make sure that they safeguard their channels and prevent...
Why Cyber Insurance Requires Endpoint Detection and Response
Many of our customers have been asking us about EDR for their Cyber Insurance requirement. Most of feel like they are already leveraging a solid endpoint strategy and are unsure why they’d need EDR. At first that seems to be a reasonable position, but when you look a...
Cyber Insurers Now Requiring Multi-Factor Authentication
If you have resources that are getting accessed remotely, it’s likely your Cyber-Insurer is going to be asking you to deploy MFA in order to remain insured or to get the best available rate. What do they mean by remote access? Well, anything that is accessed...
Ransomware Attacks Now Start with Data Exfiltration
Last year we saw a big increase in Ransomware activity and that’s only going to increase in 2021. If you drill into how much money attacking organizations are making, its easy to see why. Some organizations are believed to be earning hundreds of millions of dollars...
More Posts
Next-Gen Cyber security: Harnessing AI for Advanced Threat Prevention
Artificial Intelligence is the long awaited tech that cybersecurity has needed against all kinds of digital threats. With evolution from the traditional security approaches, it has given birth to threat prevention mechanisms that are cost-effective and robust. Most...
The Pillars of Email Security: Encryption, Filtering, and Training
In corporate America, email is still the go to for communication. It also remains the top threat vector for hackers to gain entry.. The tactics of cyber criminals are evolving every day. Organizations must make sure that they safeguard their channels and prevent...
Why Cyber Insurance Requires Endpoint Detection and Response
Many of our customers have been asking us about EDR for their Cyber Insurance requirement. Most of feel like they are already leveraging a solid endpoint strategy and are unsure why they’d need EDR. At first that seems to be a reasonable position, but when you look a...
Cyber Insurers Now Requiring Multi-Factor Authentication
If you have resources that are getting accessed remotely, it’s likely your Cyber-Insurer is going to be asking you to deploy MFA in order to remain insured or to get the best available rate. What do they mean by remote access? Well, anything that is accessed...
Ransomware Attacks Now Start with Data Exfiltration
Last year we saw a big increase in Ransomware activity and that’s only going to increase in 2021. If you drill into how much money attacking organizations are making, its easy to see why. Some organizations are believed to be earning hundreds of millions of dollars...
If You Think Security is a Commodity…Read On
In the 2000’s many end users believed that Anti-virus was a commodity. It wasn’t hard to find Security Companies that agreed with this notion. In those days the argument was simple to make, there are few kinds of threats that can be stopped with a signature. The...
Strengthening Security Posture in 2020
There is a great documentary from 2016 called Zero Days. It covers StuxNet, how it brought down Nuclear reactors in Iran, and who was potentially behind it (Israel and the United States.) Spoiler alert, but one of the final commentaries is that this attack led Iran...
2 Tips to Improve Gateway Security
HTTPS Inspection at the Gateway Stops More Threats at the Perimeter. NextGen Firewalls can be a great deterrent against ransomware. They can detect when a machine is trying to get to known bad parts of the internet and block it. They can use content and...
What You Can Learn from Facebook’s Security Lawsuits
Last fall, Facebook was the target of a data breach that impacted nearly 30 million of its 2.4 billion users. In addition to the data breach, the FTC has been investigating the activities of the political consulting firm Cambridge Analytica’s unauthorized access to...