Artificial Intelligence is the long awaited tech that cybersecurity has needed against all kinds of digital threats. With evolution from the traditional security approaches, it has given birth to threat prevention mechanisms that are cost-effective and robust. Most...
In corporate America, email is still the go to for communication. It also remains the top threat vector for hackers to gain entry.. The tactics of cyber criminals are evolving every day. Organizations must make sure that they safeguard their channels and prevent...
In the 2000’s many end users believed that Anti-virus was a commodity. It wasn’t hard to find Security Companies that agreed with this notion. In those days the argument was simple to make, there are few kinds of threats that can be stopped with a signature. The...
Last fall, Facebook was the target of a data breach that impacted nearly 30 million of its 2.4 billion users. In addition to the data breach, the FTC has been investigating the activities of the political consulting firm Cambridge Analytica’s unauthorized access to...
You’ve probably heard about cities across the U.S. being held hostage by ransomware attacks. It seems like attacks like these are making headlines every couple of months. The story is usually the same, a city agency or perhaps the entire city’s government computers...
We’ve all seen the headlines; breaches discovered months (or years) after the initial attack. Often, the length of time that hackers have access to a stolen network means the attack is deep into the systems and the amount of data being stolen is massive. Of course,...