7 steps for a network and IT security foundation

Without a strong network security strategy, IT security will fall short — and vice versa. The National Security Agency (NSA) has identified three basic functions to form the foundation... Read more »

Use business email compromise training to mitigate risk

“Please respond ASAP.” When CFO Joe receives an email from CEO Taylor with this urgent subject line, he goes into high alert. The message is pressing. The email’s sender,... Read more »

SolarWinds hack explained: Everything you need to know

2020 was a roller coaster of major, world-shaking events. We all couldn’t wait for the year to end. But just as the 2020 was about to close, it pulled... Read more »

Using content disarm and reconstruction for malware protection

The majority of malware infections begin with a phishing email. These simple lures, which trick recipients into opening malicious attachments or clicking links that lead to malicious web content,... Read more »

5 cybersecurity lessons from the SolarWinds breach

Forensics teams are still investigating how hackers were able to exploit SolarWinds’ patching system to attack numerous high-profile commercial and governmental organizations, including Microsoft and the U.S. Department of... Read more »

5 Reasons Why You Need Self Storage for Your Boat This Winter

Share While snow is a rare sight in the Lone Star State, chilly temperatures can often put an end to Texans’ boating fun. When it’s time to say goodbye... Read more »

5 key ransomware protection best practices to safeguard assets

Ransomware attacks are expected to grow both in frequency and effectiveness in 2021, with researchers at Cybersecurity Ventures predicting attacks to occur every 11 seconds and ultimately cost victims... Read more »

Cloud security policy configuration in AWS, Azure and GCP

Modern security strategies should take an inside-out approach, not outside-in. “Understanding how to protect assets inside the security perimeter is far more important than focusing on preventing attackers from... Read more »

Design a human firewall training program in 5 steps

The proliferation of cybersecurity breaches is forcing government and business leaders to analyze the limitations of technology and reevaluate the role of people. Despite incredible advances in both threat... Read more »

Top 11 cloud security challenges and how to combat them

All the major promises of the cloud — improved IT efficiency, flexibility and scalability — come with one major challenge: security. Many organizations can’t delineate where cloud service provider... Read more »
Subscribe to our Newsletter