Today’s attackers aren’t pulling any punches when it comes to persecuting our networks. For years, it hasn’t been a matter of “if” but “when” a cyberattack will occur. They look for any weakness, any hole in our defenses. Now is the time to assess your cybersecurity...
For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen. ...
What is Whaling in CyberSecurity? Imagine a vast ocean of cybersecurity, overflowing with different types of cybersecurity attacks and threats of all sizes. In these digital waters, there are a few who stand out – the “whales” of the corporate world. Whaling attacks...
What’s the first thing that comes to mind when you hear the words “security automation”? For many people in the cybersecurity industry, the idea of security automation is synonymous with automated response. But the truth is, automating response actions is only half of...
The cybersecurity hygiene rulebook says we shouldn’t reuse the same password on different accounts. Doing so creates a single point of failure for bad actors to compromise your digital life. But let’s face it. Few people are willing (or able) to remember a dozen...
In the ever-evolving world of cybersecurity, understanding the tactics employed by malicious actors is crucial. In this blog, we delve into the world of dictionary attacks, and the mechanics behind these password-cracking techniques, shedding light on how they...
The Trellix team put together an article outlining their predictions about the cybersecurity threats in 2024. What does the near future hold? Introduction This last year we have seen upheaval across the cybersecurity landscape. The need for effective, worldwide threat...
Domain impersonation is one of the easiest, most common ways that cybercriminals trick us. As the name suggests, domain impersonation is when a threat actor mimics a legitimate site with a spoof site of the same name, or one very similar. In this blog article by...
A recent UK government report warns that generative AI could increase the risk of cyber-attacks and erode trust in online content by 2025. The tech could even help plan biological or chemical attacks by terrorists, it says. In his article, Chris Vallance, technology...
Cybercriminals go where the money goes, and the obvious choice is the financial industry. Numbers would agree; the Verizon 2023 Data Breach Investigations Report states that 95% of cyberattacks are financially driven. It’s no wonder the financial services sector is...