SolarWinds hack explained: Everything you need to know

2020 was a roller coaster of major, world-shaking events. We all couldn’t wait for the year to end. But just as the 2020 was about to close, it pulled... Read more »

Using content disarm and reconstruction for malware protection

The majority of malware infections begin with a phishing email. These simple lures, which trick recipients into opening malicious attachments or clicking links that lead to malicious web content,... Read more »

5 cybersecurity lessons from the SolarWinds breach

Forensics teams are still investigating how hackers were able to exploit SolarWinds’ patching system to attack numerous high-profile commercial and governmental organizations, including Microsoft and the U.S. Department of... Read more »

5 Reasons Why You Need Self Storage for Your Boat This Winter

Share While snow is a rare sight in the Lone Star State, chilly temperatures can often put an end to Texans’ boating fun. When it’s time to say goodbye... Read more »

5 key ransomware protection best practices to safeguard assets

Ransomware attacks are expected to grow both in frequency and effectiveness in 2021, with researchers at Cybersecurity Ventures predicting attacks to occur every 11 seconds and ultimately cost victims... Read more »

Cloud security policy configuration in AWS, Azure and GCP

Modern security strategies should take an inside-out approach, not outside-in. “Understanding how to protect assets inside the security perimeter is far more important than focusing on preventing attackers from... Read more »

Design a human firewall training program in 5 steps

The proliferation of cybersecurity breaches is forcing government and business leaders to analyze the limitations of technology and reevaluate the role of people. Despite incredible advances in both threat... Read more »

Top 11 cloud security challenges and how to combat them

All the major promises of the cloud — improved IT efficiency, flexibility and scalability — come with one major challenge: security. Many organizations can’t delineate where cloud service provider... Read more »

SASE hype includes SD-WAN, but does it need to?

One of the more popular cybersecurity trends in 2021 will undoubtedly be Secure Access Service Edge, or SASE. As enterprise networks evolve to better manage traffic from remote employees,... Read more »

5-step IaaS security checklist for cloud customers

Many organizations have almost completely replaced virtual data centers, on-premises servers and appliances with IaaS. This widespread implementation requires a mobilization to secure IaaS environments to match this increased... Read more »
Subscribe to our Newsletter