Cybersecurity Awareness

Detecting a Phishing Email: 10 Things to Watch

As security professionals, we remain vigilant in identifying phishing attempts and actively seek information on defending against ransomware and phishing attacks. These topics hold paramount importance within the security community. It is well-known that phishing emails frequently serve as the…

The Ex(filtrated) Files: How to Reduce Insider Risk to Your Organization

In this webinar, LogRhythm International VP Joanne Wong, explores the origin of the increase in insider attacks, implications these attacks can have on your business, and outlines a holistic plan for organizations to reduce the risk of insider threats.

How to Clean up the Tool-Sprawl Mess

Editor’s Note: This a partnered sponsored guest blog written by Cadre See a problem, throw a technology at it. See another problem, throw another technology at it. According to a global survey by IBM, this mindset has led to enterprises…

cyber hacker with code

The Art and Science of Threat Hunting – A Guide to Preventing Cyberattacks

Editor’s Note: This a partnered sponsored guest blog written by Avertium. What is threat hunting? Cyber threat hunting is a proactive cybersecurity strategy that searches through networks to detect and isolate advanced threats before they present themselves. Threat hunters do…

Looking in rear view mirror

A Look Back at Which Predictions Came True in 2021

In 2021, cybercriminals took aim at critical infrastructure with ransomware attacks on Colonial Pipeline, JBS and others. They also continued to find new ways to exploit employees working remotely, those seeking information on COVID-19 vaccines, and improperly secured APIs. In…

Cybersecurity Awareness Checklist Blog Post Header

Cybersecurity Awareness Checklist for Remote Workers

More and more organizations are shifting to remote work, reaping the benefits of social distancing and enhanced worker safety. But danger still looms. Without the top-down cybersecurity defenses of on-premise work environments and the close oversight of security experts, remote…