What Is EDR and How Does It Fit Into Your Security Strategy?
Back in 2013, Gartner’s Anton Chuvakin set out to name a new set of security solutions that sniff out suspicious activity on endpoints. After what he called “a long agonizing process that involved plenty of conversations with vendors, enterprises, and other...
How organizations can best succeed with their cybersecurity resolutions
Throughout 2019, we witnessed a number of record-breaking data breaches. Over 5,000 companies reported a data breach throughout the year, combining to compromise eight billion records. This unfortunate trend demonstrates two issues: cybercriminals are constantly...
Phishing scams top the threat list
A staggering 96% of organizations say that e-mail phishing scams pose the biggest security risk facing their businesses over the next year. A further three quarters (76%) say the greatest and most persistent threat is the careless insider who unthinkingly clicks on...
50 Shades of Gray in Cybersecurity
Nearly 90% of data breaches happen because of poor cybersecurity posture. Unfortunately, a strong cybersecurity posture is not necessarily a function of dollars invested or the number of tools deployed. Organizations struggle to understand and improve their security...







