Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bridging the Cyber Skills Gap for Small Businesses

Small and Medium Enterprises (SMEs) have encountered increasing burdens over the last few years, from challenging economic conditions to a dramatically evolving cyber threat landscape. Today, 43% of cyber attacks are targeted at SMEs, and only 14% of targeted SMEs were prepared to handle such attacks. An astonishing 75% of those SMEs attacked could result in permanent closure if unable to recover data.

Sharing is Not Caring: Hunting for Network Share Discovery

Organizations rely on interconnected systems to store, share and manage information. These ecosystems often incorporate network file shares, which act as repositories of various types of data within an organization. Unfortunately, it is not uncommon for sensitive files to find their way onto these network shares inadvertently with permissions that are too broad or not properly restricted.

What is Cloud Security? Types, Risks & Benefits Defined

With data breaches making the headlines almost daily, it can feel like you’re stuck in a never-ending discussion about how secure data is in the cloud. On one hand, cloud naysayers may be preaching cloud repatriation in response to the high profile cloud compromises of the last few years. On the other hand, being too sure of your data security is a major recipe for trouble — hubris has no place in cybersecurity.

Imparting Trust: Paws for Reflection

In this week's episode, Bill and Robin delve once again into the world of Zero Trust as they discuss how end-to-end encrypted messaging services have fallen victim to the BadBazaar trojan, as well as asking the question "Should you trust URLs on your children's snacks?" Learn all this and more on the latest episode of The Ring of Defense!

Manage by Objectives | The New Normal

In today's rapidly evolving business landscape, a significant challenge has emerged for managers—the shift from traditional hands-on management to a more objective-based approach. Join us in this insightful discussion as we explore how managers are navigating this transition, realizing that the days of "managing by walking around" are giving way to a new era of leadership. In this video, we delve into the experiences of managers who've grappled with the realization that physical proximity is no longer the cornerstone of effective leadership. Discover the strategies they're adopting to ensure their teams thrive in this changing environment, where success is measured by outcomes rather than constant oversight. If you're a manager seeking to understand how to remain relevant and impactful in the modern workplace, this video is a must-watch. Embrace the paradigm shift and learn to manage by objectives, fostering a culture of achievement and innovation.

What Is Zero Trust? Top Benefits & How It Works

Organizations are tasked with the continuous challenge of having to keep up with advancing cyber threats and must change their security strategies for them to remain secure. Zero Trust Security is a response that demands identity validation from all users, devices, and networks, thus eliminating implicit trust altogether.

Business Continuity Plans for Financial Institutions

Disasters rarely strike with advanced notice. That’s especially true in the business world, where there’s no such thing as a business meteorologist to forecast potential threats that may beset a company’s personnel or assets. That’s where a Business Continuity Plan comes into play.

Cyber Criminals Targeting Victims Through Beta-Testing Apps

Cybercriminals use a variety of deceptive methods to defraud their victims. It can be challenging to keep up-to-date with the latest threats to your online security. The Federal Bureau of Investigation (FBI) has warned people about the dangers of a new threat - malicious beta-testing apps. These apps can have severe consequences for our data and finances. In this article, we'll explain how this latest attack works, the signs of a malicious app you need to be aware of, and, most importantly, what cybersecurity tools you need to protect yourself.

Navigating Online Education Challenges through Digital Identity

As the end of summer approaches, the back-to-school season ushers in a wave of students ready to embark on their educational journeys. According to Eurostat's 2020 data, a staggering 18 million students were enrolled in tertiary education in Europe, a number that continues to rise each year. Amidst this educational landscape, the digital era's expansion and the ongoing impact of the COVID-19 pandemic have fueled a surge in online learning.

Threat-Loaded: Malicious PDFs Never Go Out of Style

In the realm of cybersecurity, danger hides where we least expect it and threats never, ever, go out of style! Over the past few months, Trustwave SpiderLabs has seen a rising trend in threat actors employing PDF documents to gain initial access through email-borne attacks. Though the use of PDF files as a malicious vector is not a novel approach, it has become more popular as threat actors continue to experiment with techniques to bypass conventional security controls.