10 Reasons Cyber Range Simulation Is Vital to Incident Response

Are you really prepared to respond to a cyberattack? You don’t want to discover halfway through a data breach that your incident response (IR) playbook cracks under pressure. Just 23 percent of organizations have a consistently applied cybersecurity response plan, according to IBM Security and the Ponemon Institute’s recent “2019…

Read More

10 Surprisingly Bright Spots on the Darknet

The darknet isn’t all creepy, illegal content. There’s definitely no shortage of criminal forums or malware marketplaces beneath the surface web, but there’s also a few legitimate websites and communities. To be clear, the darknet is still, well, dark and dangerous. You shouldn’t just download a Tor browser and go…

Read More

5 Key Steps to Developing Your Global Data Privacy Program

The wave of new, tougher compliance regulations springing up worldwide can be disconcerting for organizations, regardless of how they engage with and serve their customers. This two-part blog aims to provide some recommendations to help those attempting to deal with the security aspects of data privacy as organizations begin to…

Read More