IoT Devices: If You Connect It, Protect It

A refrigerator that tells you there was a power outage — and whether it lasted long enough to spoil your food. Doorbells that show you who’s at the door, and allow you to communicate with […]

National Cybersecurity Awareness Month Empowers Individuals, Orgs to Own Their Role in Cybersecurity

What’s scarier than Dracula, trickier than a haunted house and more expensive than a giant bucket of Halloween candy? Cyberattacks — and they can devastate individuals and organizations alike. Fortunately, however, they can be prevented […]

Advanced Threats: Am I At Risk?

In “The Art of War,” Sun Tzu said, “If you know the enemy and know yourself, you need not fear the result of a hundred battles … if you know neither the enemy nor yourself, […]

Overcoming Advanced Evasion of Malware Detection

Malware evasion tactics are now fully present in the arsenal of threat actors. It’s essential that any threat detection technology remain hidden from malware to be able to effectively detect advanced attacks. Equally important, the […]

Not Safe for Work

As businesses increasingly rely on Office 365 files, sightings of their “evil twin” are on the rise. It was nearly a week late, but Tom finally received the pricing proposal he’d requested from Tetome Supply. […]

Facebook

Recent
Comments
Tags

This post is also available in: Portuguese (Brazil) French German Japanese Korean Spanish