Cybersecurity Blog

Featured Post

Four Cybersecurity Trends in a Post-Coronavirus 2020

A lot has changed in our personal and professional lives with COVID-19. What hasn’t changed, and in fact may be getting worse, is the threat from hackers and how they are using the chaos and uncertainty of the situation, as well as the resulting change in business models, to their advantage. Many...


(7 min read 1371)

Tags: cyber attack, cybersecurity, ransomware,

The Breaches Just Keep Coming (and so do the Ramifications)

Recent high-profile data breaches prove that the problem is getting worse, not better. Traditional security tools were designed...


(4 min read 837)

Tags: data breach, gdpr, cybersecurity

Webinar: Using AI and ML to Improve Threat Detection and Response

Companies of all sizes continue to struggle when it comes to detecting and stopping cyberattacks. Now you can learn how the ARIA...


(3 min read 641)

Tags: cybersecurity, intrusion response, intrusion detection

Update on the California Consumer Protection Act

The California Consumer Protection Act (CCPA) went into effect on January 1, 2020. While no companies have failed to comply...


(4 min read 897)

Tags: data breach, gdpr, cybersecurity,

A Sad Outcome of the Coronavirus: Cyber-attackers Exploiting the Situation

It didn’t take very long for hackers and cyber-attackers to take advantage of the confusion and stresses of COVID-19 felt by...


(5 min read 1045)

Tags: cybersecurity, ransomware, data protection,

Stop Threats With ARIA SDS and SumoLogic's New Integration

A new out-of-the-box integration between Sumo Logic’s Continuous Intelligence Platform and ARIA Cybersecurity Solutions’ ARIA SDS...


(3 min read 653)

Tags: cybersecurity, siem, intrusion response,

Our Takeaways from the 2020 RSA Security Conference

This year’s RSA Security Conference was a rousing success, even with the onslaught on Covid-19. During our time at the show there...


(5 min read 953)

Tags: cyber attack, secdevops, cybersecurity

Reap the Benefits of IoT, Without Compromising SCADA Security

Industry 4.0,” the Industrial Internet of Things (IIoT), and other trends are capable of delivering many powerful benefits, but...


(6 min read 1158)

Tags: cybersecurity, IoT, operational technology

Improve the Effectiveness of SOAR Solutions, and Accelerate Threat Detection and Response Times

One way to think of SOAR security solutions is that they’re essentially where man meets machine in the cybersecurity world. Yet...


(5 min read 1088)

Tags: cyber attack, cybersecurity, siem