Many organizations are moving their business applications, processes, and operations into the cloud in order to take advantage of the flexibility and scalability that cloud provides. However, current threat detection and response solutions aren’t comprehensive or effective in monitoring and...
Tags: cyber attack, cybersecurity, data protection
While the reports are still rolling in, we have a pretty good understanding of what occurred with the recent SolarWinds attack.
Tags: cyber attack, cybersecurity, intrusion response,
Let’s face it: The current, standard approach to threat detection and response just isn’t cutting it. But now, a choice of two...
Tags: cyber attack, cybersecurity, intrusion response,
Security and cyber-attack prevention are very real concerns in the industrial sector, especially as more machinery and equipment...
Tags: cyber attack, data breach, cybersecurity,
A lot has changed in our personal and professional lives with COVID-19. What hasn’t changed, and in fact may be getting worse, is...
Tags: cyber attack, cybersecurity, ransomware,
This year’s RSA Security Conference was a rousing success, even with the onslaught on Covid-19. During our time at the show there...
Tags: cyber attack, secdevops, cybersecurity
The trend of the Internet of Things (IoT), including the related Industrial Internet of Things (IIoT) and the Internet of Medical...
Tags: cyber attack, cybersecurity, IoT
One way to think of SOAR security solutions is that they’re essentially where man meets machine in the cybersecurity world. Yet...
Tags: cyber attack, cybersecurity, siem
A cyber threat attack surface refers to the digital and physical vulnerabilities in your hardware and software environment. Learn...
Tags: cyber attack, cybersecurity
A look back at three of the biggest cyber security trends of 2019, and how a new approach to incident response and threat...
Tags: cyber attack, gdpr, cybersecurity,
Enter your email address to subscribe to this blog and receive notifications of new posts by email.