What Is EDR and How Does It Fit Into Your Security Strategy?
Back in 2013, Gartner’s Anton Chuvakin set out to name a new set of security solutions that sniff out suspicious activity on endpoints. After what he called “a long agonizing process that involved plenty of conversations with vendors, enterprises, and other...
How organizations can best succeed with their cybersecurity resolutions
Throughout 2019, we witnessed a number of record-breaking data breaches. Over 5,000 companies reported a data breach throughout the year, combining to compromise eight billion records. This unfortunate trend demonstrates two issues: cybercriminals are constantly...
How cybercriminals are using Microsoft to launch phishing attacks
Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted. You may not be familiar with Microsoft Sway or at least have never used it. But cybercriminals have been exploiting this web app to send phishing...
Preparing for Iranian Cyberattacks: An Overview of Recent Threat Activities
Executive Summary The death of Qasem Soleimani by a U.S. airstrike increases the likelihood that Iran will seek to retaliate against U.S. assets using destructive malware. However, given the complexity of attacks, timing of any potential action is...







