Category

Blog
Written by Damien Lewke of Crowdstrike Social engineering continues to be exploited by hackers and feared by security teams. Due to attackers’ subtlety and users’ natural curiosity, hackers succeed daily in baiting users to click on a link or answer a phishing email.  Baiting is a highly successful technique that relies on an organization’s weakest...
Read More
Written by: Yogi Chandiramani of Zscaler The internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the proliferation of mobile devices, has rendered traditional network and security best practices obsolete. Indeed, as the...
Read More
Cybersecurity may seem like a foreign language to many executives and organizations who are not well versed on the subject. Despite how much you need cybersecurity, you don’t know what you don’t know. Do you have a strategy to minimize your risk? Are you seeking an expert to give your organization top tier cybersecurity direction?...
Read More
Written by: Damien Lewke of Crowdstrike The holidays are a time for reflection, getting together with friends, shopping — and increasingly, cybercrime. With the rise of e-commerce, adversaries gleefully look forward to the holidays as an opportunity to harvest valuable payment and credential information from record numbers of unsuspecting online shoppers. In the United States...
Read More
Our world is mobile. You work in the office and everywhere else, using our mobile devices. What happens beyond your office’s firewall?  Are you secure inside your work environment? What about in the wild? Without endpoint security on your devices, you are vulnerable. What is endpoint security? Endpoint security is essential to the protection of...
Read More
By Stan Lowe of Zscaler If there’s one thing we can predict for certain for 2019, it’s that cyber criminals will continue to spin up more and more innovative ways to exploit gaps in security. The hackers have IoT devices on their radar, and they’ll keep on looking to the cloud for new opportunities to...
Read More
Written By Scott Taschler of Crowdstrike Graph databases are having a bit of a moment in cybersecurity. With recent releases from industry juggernauts such as Microsoft and Google/VirusTotal, it seems “graph” could be poised to take center stage as a security industry buzzword and the next must-have cybersecurity technology. However, using a hot technology doesn’t...
Read More
There are roughly 156 million phishing emails sent each day. 16 million of those emails make it to inboxes and are not sent to spam. Out of those numbers, 80,000 people take the lure per day from phishing emails. A phishing email attack is when a hacker baits an organization by posing to be someone...
Read More
Written by: Pooja Deshmukh from Zscaler Are you a frequent traveler? If so, you probably participate in at least one rewards program in which you accrue airline miles or earn hotel points. The hospitality industry practically invented these loyalty programs and they’ve been enormously popular, delivering value to customers and merchants alike. It turns out, membership account...
Read More
Did you know that the majority of cybersecurity threats you encounter come through the internet? When you are surfing the internet, your computer, your network, and your data is in critical danger of being breached. Internet security is mandatory for any organization. Internet security is the foundation of a multi-layered approach to cybersecurity. To keep...
Read More
1 2 3 4 5 9