According to the 2019 “IBM X-Force Threat Intelligence Index” report, “the finance and insurance sector has been the most-attacked industry for three years in a row, with 19 percent of total attacks and incidents in 2018.” As the evolving threat landscape grows, so does customer demand for convenience, raising concerns…
Read More
In the Ponemon Institute’s fourth annual study on “The Cyber Resilient Organization,” cyber resilience is defined as the alignment of prevention, detection and response capabilities to manage, mitigate and move on from cyberattacks. Every organization strives for more cyber resilience. What the Ponemon study uncovered is that there is a…
Read More
The threat of fileless malware and its potential to harm enterprises is growing. Fileless malware leverages what threat actors call “living off the land,” meaning the malware uses code that already exists on the average Windows computer. When you think about the modern Windows setup, this is a lot of…
Read More
Where does “it” end? We can probably all agree that securing and protecting the devices that communicate with our networks is a fair definition of endpoint security. Similarly, these devices are one of the best places to start when figuring out how to secure your networks because they are a…
Read More