Preparing for Iranian Cyberattacks: An Overview of Recent Threat Activities
Executive Summary The death of Qasem Soleimani by a U.S. airstrike increases the likelihood that Iran will seek to retaliate against U.S. assets using destructive malware. However, given the complexity of attacks, timing of any potential action is...
Information Security: Your People, Your First Line of Defense
A company can put together as many technology solutions or policies as it likes, but, in the end, its people are the most important element in information security. If the employees in your organization don’t feel personally invested in improving your organization’s...
Phishing scams top the threat list
A staggering 96% of organizations say that e-mail phishing scams pose the biggest security risk facing their businesses over the next year. A further three quarters (76%) say the greatest and most persistent threat is the careless insider who unthinkingly clicks on...
How to explain CVE, Common Vulnerabilities and Exposures, in plain English
CVE (Common Vulnerabilities and Exposures) is a list of publicly known cybersecurity vulnerabilities. Here’s what it does and doesn’t offer – and how it can help your organization’s security pros and other teams. When your organization is facing an...







