Detecting a Phishing Email: 10 Things to Watch
Posted by: Eric Brown
As security professionals, we remain vigilant in identifying phishing attempts and actively seek information on defending against ransomware and phishing attacks. These topics hold paramount importance within the security community. It is well-known that phishing emails frequently serve as the…
Read MoreSeptember 18, 2023
Artificial Intelligence – A Danger to Patient Privacy?
Posted by: Mikiann McIntosh
Industries worldwide have integrated artificial intelligence (AI) into their systems as it promotes efficiency, increases productivity, and quickens decision-making. ChatGPT certainly raised eyebrows as it demonstrated similar characteristics at the start of its debut back in November 2022. The healthcare sector…
Read MoreAugust 28, 2023
SaaS vs. Cloud-Native: Definitions and Security Best Practices
Posted by: Matt Willems
There’s a disconnect in how we talk about applications that are no longer hosted within our own data center. When speaking with customers, we’ve observed that “software as a service” (SaaS) and “cloud-native” are terms that tend to be bundled…
Read MoreAugust 16, 2023
What Comes After Your SIEM Purchase?
Posted by: Kevin D. Kirkwood
Let’s say you recently acquired a security information and event Management (SIEM) solution and now have a new layer of defense in the war against cybercriminals. Check! You’re done right? Not even close. The reality is there is still a LOT more…
Read MoreJuly 24, 2023
Guide to Building a Cybersecurity Incident Response Plan [Part 2]
Having a cybersecurity incident response plan is essential for any organization that wants to be prepared for a security incident. By being prepared for an incident, your organisation is able to align and respond quickly if and when one happens.…
Read MoreJuly 17, 2023
Detecting Microsoft Exchange Zero-Day Exploits
Posted by: Brian Coulson
What is a Zero-Day Exploit? What Can be Done About Them? In cybersecurity, a zero-day exploit refers to the method a hacker uses to take advantage of a security vulnerability in a computer system, software, or network. When a zero-day…
Read MoreJuly 16, 2023