Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar: Insuring Your Digital Future - Understanding Cyber Insurance Requirements

With cyber threats becoming increasingly common, businesses of all sizes must be prepared to protect themselves from potential data breaches and other cyber attacks. Cyber insurance can be an important tool for managing these risks, but understanding the requirements of cyber insurance can be challenging. These requirements typically vary depending on the specific policy and insurer, but they often include factors such as the size and type of business, the industry in which the business operates, and the risk level associated with its IT infrastructure and data. In addition to meeting these eligibility requirements, businesses may need to comply with certain cybersecurity protocols and standards to maintain their coverage. This webinar will discuss these cyber insurance requirements and offer potential solutions for protecting your business from data breaches and other cyber threats.

5 ways to prevent phishing from ruining your summer vacation

During the summer months, when employees and customers are away on vacation, things usually slow down for businesses. But for cybercriminals, the opposite is true because they are busy taking advantage of minimal staffing levels in companies during the vacation period to launch complex attacks. The U.S. Federal Cybersecurity and Infrastructure Security Agency (CISA), warns that the risk of being hit by a cyberattacks rises over the holidays and summer vacation-themed phishing attacks gain momentum.

4 tips on how to prevent MFA fatigue in your company

Implementing multi-factor authentication (MFA) is undoubtedly the best way to protect your company and its data. However, when it comes to identity management, both users and administrators tend to demand a balance between efficiency, convenience, and security, all at the same time. It is a difficult challenge, but one that can be met. This is mainly because users may see MFA as a barrier that creates friction during use that can slow down productivity.

Solving False Positive EDR Alerts

Endpoint Detection and Response (EDR) alerts are what happens when an EDR system decides that event data from an agent installed on an endpoint, or several endpoints, shows a potential threat. This doesn’t mean that every EDR alert is a malicious event in progress. Many are “false positives” or malicious behaviour that is actually not a threat.

The 443 Podcast - Episode 252 - Qakbot Qacktivity

This week on the podcast, we cover the latest evolutions of the decade-old Qakbot malware including changes in how attackers deliver it. After that, we give an update on the SEC's new rules around mandatory security disclosure. We then end by reviewing CISA's analysis of Risk and Vulnerability Assessments they completed for their constituents in 2022.

Virtual Patching: the solution to Windows 10 EOL

Windows 10, which is still the most widely deployed operating system on desktops, has announced end of support for October 14, 2025. The current version, 22H2, will be the last version of Windows 10, which means that Microsoft will stop providing support and security updates for that particular version and any vulnerabilities discovered after the EOL (End of Life) date will not be fixed by Microsoft, leaving your operating system, and that of your customers, exposed to security risks.

Five Critical Security Platform Gaps to Avoid

The debate surrounding the integration of best-of-breed versus a single-vendor security platform has been discussed for some years. On one side, we have niche solutions that offer a specialized approach to addressing cybersecurity challenges. On the other side, there are the potential benefits of a consolidated platform that promises seamless interoperability for an exponential improvement of security posture.