Analysis, Advice and Predictions from a Ransomware First Responder

We’ve previously suggested that 2015 may have been the year “ransomware hit the big time,” but ...

Read More

The What, Why, and How of AttackSurfaceMapper

The primary goal for any security professional today is to present less of a target-rich ...

Read More

7 Questions to Ask Before Hiring A Security Partner

As cyber threats continue to proliferate and pressure on in-house security personnel grows, it’s ...

Read More

The 3 Biggest Database Threats and What Your Security Plan Should Look Like

Serving as the storekeeper of your most sensitive assets, from college admissions applications to ...

Read More

So, You’ve Been Breached: 9 Steps to Mitigate the Fallout

Discovering that you’ve been the victim of a breach is never pleasant. Perhaps your customers’ data ...

Read More

How to Make the Most of an Incident Response Retainer

With cyber threats continuously looming, there is a good chance you’ll have an incident to respond ...

Read More

How Your Adversaries Increase Their Odds Thanks to the Growing Attack Surface

I recently listened to a podcast discussing the expanding legalization of sports betting in the ...

Read More

3 Reliable Methods to Safeguard Microsoft Office 365 Users and Data

In a previous article, I discussed the general security considerations you should incorporate into ...

Read More

What You Need to Know about NERC CIP Cybersecurity Standards

For more than a decade, energy and utility organizations have been tasked with meeting standards ...

Read More

12 Clear-Cut Ways to Respond to Mandatory Breach Notification Rules in Canada

This week brings mandatory breach notification to the Personal Information Protection and ...

Read More

Why Routers are the Neglected Endpoint and How to Protect Them

If you are like most people, the only time you think about your routers is when the internet goes ...

Read More

9 Awesome Resources to Sharpen Your Security Skills

National Cyber Security Awareness Month spans October - even though we know all too well that ...

Read More

A Complete Tutorial on Rolling Out Microsoft Office 365 Securely

Microsoft Office 365 (O365) is more than a service that provides employees with access to core ...

Read More

The Supply Chain is Only as Strong as its Weakest Link: How You Can Better Defend Against Third-Party Cyberattacks

A particularly unfair aspect of a maturing cybersecurity program is that even as your business ...

Read More

The Cliffs Notes Version to Addressing the Ransomware Threat at Schools

It's back to school time: for teachers, students…and cybercriminals.

Read More

Charlie Discovers Security Testing

You may remember our "Security Testing Practices and Priorities" report, which studied how ...

Read More

A 4-Step Process for Softening the Blow of a Zero-Day Vulnerability

Halloween is almost here, and if you want to bring out the fright in security professionals, ...

Read More

9 Pen Testing Essentials for Making ATMs Less Hackable

Criminals fancy ATMs for the same reason cybercriminals do: convenience. There are some four ...

Read More

How to Eliminate Common Sources of Employee Fraud

While you want to believe all your employees are loyal and trustworthy, many reasons exist for why ...

Read More

Protecting Your Mobile Data: Advice from an Ethical Hacker

Face it: Your employees love their mobile applications. The average person uses 11 apps on their ...

Read More

9 Steps to Slowing and Stopping Your Next Data Breach

Data breaches are such an anxiety inducer because you never know when they're coming, you're often ...

Read More

7 Powerful Pointers to Help Thwart Email-Based Attacks

While alternative options for functional communication channels are steadily growing for business ...

Read More

How Small Retailers Can Take Their Cybersecurity from Zero to 60

A laundry list of major companies of which you've almost certainly been a customer have been ...

Read More

How to Defend Your Industrial Control Systems: 8 Practical Steps

Ask virtually any security expert to name the most nightmarish scenario related to the ...

Read More

What to Do When You‘re Getting Phished but Have No Idea Because It Looks Totally Authentic

A "huge, startlingly fast-moving, and perplexing" phishing attack made its way to an estimated one ...

Read More

The 8 Do’s and Don’ts of Remote Access and Point-of-Sale Systems

Over the years, the point-of-sale (POS) environment has evolved from traditional cash registers and ...

Read More

How to Thrive as a CISO in 2017

The job of a cybersecurity executive is a test in resilience and thoughtfulness. Aside from ...

Read More

10 Ways You and the Board Should Share the Security and Risk Burden

Never mind sophisticated hackers, advanced attacks or naïve employees, one of the most aggravating ...

Read More