Recently, IBM Security announced the results of the “2019 Ponemon Institute Study on the Cyber Resilient Organization,” the fourth annual look at cross-industry preparedness for cybersecurity. Each report has taken a year-over-year look at the current state of cyber resilience and the business’ ability to maintain its core purpose in…
Read More
Because innovation is moving so rapidly, keeping up with industry best practices can seem like a full-time job on its own. Plus, attackers are constantly evolving their campaigns, often exploiting zero-day vulnerabilities with attacks that have no known signature — allowing them to evade detection from most security tools. How…
Read More
Large tech and social media companies often share user data with other businesses for marketing purposes. In recent history, there have been many publicized breaches and other security incidents involving the personally identifiable information (PII) stored by these companies. This only creates a perfect storm for more breaches. Enterprises that…
Read More
There’s some confusion in the security industry between the terms “red teaming” and “penetration testing.” This blog post will discuss how the confusion may have come to be and provide a breakdown of some of the differences between the two exercises. It will also discuss which business challenges align with…
Read More