
eBook: Protecting Active Directory
Microsoft Active Directory (AD) is ubiquitous across the corporate landscape and a perfect target for cyberattacks due to its popularity and importance. A single set of …

How do I select a SOAR solution for my business?
Security Orchestration, Automation and Response (SOAR) products offer an appealing solution, promising efficiencies in detecting and responding to threats. However, …

Security awareness programs: The difference between window dressing and behavior change
CISOs are responsible for pursuing cybersecurity purchases that align with the overall health of their organizations. All investments must drive tangible value and ROI while …

Number of ransomware attacks grew by more than 150%
By the end of 2020, the ransomware market, fueled by the pandemic turbulence, had turned into the biggest cybercrime money artery. Based on the analysis of more than 500 …

Digital-first lifestyle opens consumers to potential risks during tax season
Consumers have faced a lot of change over the past year with the shift to a digital-first lifestyle, and tax season with increasing risks is no exception. McAfee’s 2021 …

Trends that will influence remote work in 2021 and beyond
Motus released a report which examines the trends that will influence remote work in 2021 and beyond. Remote work in 2021 and beyond While U.S. organizations rapidly …

Week in review: Exchange Servers under attack, disinformation economics, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: How do I select a cloud security solution for my business? To select a suitable cloud …

March 2021 Patch Tuesday forecast: Off to an early start
Microsoft got an early start on Patch Tuesday, releasing a series of out-of-band security updates this week to address four zero-day vulnerabilities in Exchange Server. …

Risky business: 3 timeless approaches to reduce security risk in 2021
Since the COVID-19 pandemic drove workforces home, we’ve seen an increase in security risk across the board: from an increase in phishing and spear phishing attacks to an …

Credential exposure trends: You need a better password
SpyCloud researchers recovered more than 4.6 billion pieces of personally identifiable information and nearly 1.5 billion stolen account credentials from 854 breach sources in …

Cybercriminals increasingly impersonate business-related apps
Cybercriminals have wasted little time in capitalizing on the vulnerabilities that come with remote work, and their attacks have been highly targeted, with a focus on …

To support a growing remote workforce, the public sector turned to the cloud
Nutanix announced the global public sector industry findings of its report, measuring organizations’ plans for adopting a private, hybrid and public cloud. The findings point …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)