Cybersecurity Blog

Featured Post

Five Critical Capabilities You Need to Stop Ransomware Attacks

A closer look at ransomware: what is it, why is it so devastating, and why aren’t we doing a better job at preventing it? This blog also describes an innovative new cybersecurity solution and shows how it can detect and prevent ransomware, malware, and other intrusions—before they can do damage.


( read )

Tags: cyber attack, cybersecurity, data protection,

Improve the Effectiveness of SOAR Solutions, and Accelerate Threat Detection and Response Times

One way to think of SOAR security solutions is that they’re essentially where man meets machine in the cybersecurity world....


( read )

Tags: cyber attack, cybersecurity, siem

What is a Threat Attack Surface? And How Can You Minimize Your Risk?

A cyber threat attack surface refers to the digital and physical vulnerabilities in your hardware and software environment....


( read )

Tags: cyber attack, cybersecurity

What Do the Worst Breaches in History All Have in Common?

A Review of the Nine Worst U.S. Data Breaches Reveals the One Common Element that Led to Disaster

In this blog article, we...


( read )

Tags: cyber attack

A New Approach to Cyber Security Incident Response

How to better leverage the security tools you have to achieve faster incident response and surgical threat containment

...


( read )

Tags: cyber attack, data breach, cybersecurity

Faster, Better Threat Identification Means Faster Incident Response.

Here we go, again. The recent Petya ransomware attack caught the EU off guard and created chaos that rippled through...


( read )

Tags: cyber attack, cybersecurity, intrusion response,

The British Airways GDPR Fine and What to Learn From It
0
Share!
 
 
 

British Airways is the latest to feel the financial impact of the GDPR regulation. ...


( read )

Tags: cyber attack, data breach, gdpr,

What is the Texas Data Breach Notification Law?
0
Share!
 
 
 

( read )

Tags: cyber attack, data breach, cybersecurity