Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing BDRSuite: Your Affordable Alternative to Rising Comet Backup Costs

As Comet Backup prices surge, many Managed Service Providers (MSPs) are seeking a cost-effective yet feature-rich backup and disaster recovery solution. BDRSuite by Vembu, the perfect choice for your data protection needs. Let’s explore why BDRSuite is gaining traction among MSPs.

Navigating the Future of Cybersecurity: Top I&O Challenges for the Year Ahead

The “I&O Perspectives” blog series features interviews with industry visionaries and experts with roles in product management, consulting, engineering and more. Our goal is to present different viewpoints and predictions on how organizations’ networking, infrastructure and operations (I&O) are impacted by the current threat landscape, existing networking and cybersecurity tools, as well as implications for the future of SASE.

Highlights from RSA Conference: Secure by Design, AI Insights, and Global Collaboration

RSA Conference 2024 brought together industry experts, practitioners, and policymakers to discuss the latest trends and challenges in cybersecurity. We showcased our commitment to CISA's Secure by Design, explored the potential of AI in risk management, and emphasized the significance of global collaboration. Here are some highlights from our time at RSA Conference, providing insights into the discussions and announcements that shape the future of cybersecurity.

New Threat Report Finds Nearly 90% of Cyber Threats Involve Social Engineering

Analysis of over 3.5 billion attacks provides insight into where threat actors are placing their efforts and where you should focus your cyber defenses. It’s said you can predict the outcome of the presidential election with a small number of votes. That’s the power of statistics and a valid sample size. So, when you have 3.5 billion cyber attacks as your sample data, it’s a very accurate reflection of the state of attacks.

Defender Fridays Wrap-Up: Cybersecurity in Space, Enterprise Security Monitoring, and more

This session of Defender Fridays highlighted the importance of enterprise security monitoring. As cyber threats become more complex, the ability to detect and respond to them is crucial for modern business operations. Wes discussed various tools that help collect and analyze data from both networks and user endpoints, clarifying the limitations of TLS interception and concluded by recommending a blend of network and endpoint visibility for a comprehensive and robust security strategy. Links.

Poor cyber hygiene causes over 50% of cybersecurity incidents

The security habits that companies and employees adopt on a daily basis are almost as important as the cybersecurity solutions they implement. Even if a sophisticated and seemingly robust cybersecurity system is in place, inadequate practices and usage can lead to cybersecurity incidents and breaches that have serious consequences. Failing to cultivate good cybersecurity practices in a company's culture can prove a determining factor when dealing with potential threats.

5 ways IAM helps with cybersecurity

Identity and Access Management (IAM) is a cybersecurity discipline, so it’s almost trivial to claim that a solid IAM foundation brings critical security benefits for any organization. Fundamentally, IAM allows the right people to access the right resources at the right times, in the right way for the right reasons. Yet IAM projects consistently take a backseat to other, more fashionable cybersecurity initiatives in a lot of organizations, ultimately harming the security posture.

Behind the MDR Curtain: The Importance of Original Threat Research

Searching for a quality-managed detection and response (MDR) service provider can be daunting, with dozens of vendors to choose from. However, in its 2023 Gartner Market Guide for Managed Detection and Response Services, Gartner confronts the challenge head-on.

Dissecting a Multi-stage Phishing Attack.

Phishing is one of the most common forms of cyber attack that organizations face nowadays. A 2024 risk report states that 94% of organizations fall victim to phishing attacks, and 96% are negatively impacted by them. However, phishing attacks are not only growing in number but are also more sophisticated and successful. This is owing to the modern multi-stage phishing attack, which is common nowadays.

Important Security Defenses to Help Your CISO Sleep at Night

This is Part 13 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. If you search recent cybersecurity news it's easy to find the threats that keep your CISO awake at night. While there are many, a short list is: However, it's quite a bit harder to find articles discussing defenses against these attacks, so let me help out by offering a select set of security best practices that, if properly deployed, should help your CISO sleep at night.