
Will 2023 be another year of chaos and instability?
A defining characteristic of 2022 has been the way that online campaigns driven by real-world events have amassed unexpected energy, fueling hacktivism and inviting in global …

3 major threat detection methods explained
The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by …

Analyzing Australia’s cyberthreat landscape, and what it means for the rest of the world
Australia has been the victim of damaging cyberattacks in the latter half of this year, with high-profile incidents impacting businesses across critical sectors such as …

Preventing a ransomware attack with intelligence: Strategies for CISOs
Bad news first: Ransomware isn’t going anywhere. The good news? The right intelligence can help organizations dramatically reduce risk surrounding a cyber extortion event. In …

December 2022 Patch Tuesday forecast: Fine-tuning the connectivity
Microsoft wrapped up a lot of ‘loose ends’ last month with their November set of updates, but there is still some work to do before the end-of-year holiday season. The …

Why automation is critical for scaling security and compliance
As companies are modernizing their tech stacks, many are unwittingly putting their business and customers at risk. Why? Because technology moves faster than teams can keep …

Data protection and security in 2023
Change is the only constant. How we think about data protection, rules and regulations, and the changing of organizational structure is evolving. The good news is that …

How to get cloud migration right
If you want to get cloud migration right, you must deal with an inconvenient truth: Cloud or hybrid cloud environments lower the drawbridge between your data center and the …

What’s the Matter with digital trust in smart home devices?
Only a decade ago it may have been hard to imagine how digital and connected many of our home features would become. From thermostats to speakers to refrigerators that can all …

Engage your employees with better cybersecurity training
Cybercriminals use a variety of tactics all at once and are constantly innovating. Organizations need to do the same and take a multidimensional approach to cybersecurity …

Don’t ignore the security risks of limitless cloud data
Over the past two decades, technology has evolved to make it easy and affordable for companies to collect, store and use massive amounts of data. From AWS to Google Cloud to …

Cybersecurity engineering under the Federal Trade Commission
When the Federal Trade Commission (FTC) releases new regulations or changes to existing ones, the implications may not be obvious to the average business or company employees. …