How cybercriminals are using Microsoft to launch phishing attacks
Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted. You may not be familiar with Microsoft Sway or at least have never used it. But cybercriminals have been exploiting this web app to send phishing...
How to explain CVE, Common Vulnerabilities and Exposures, in plain English
CVE (Common Vulnerabilities and Exposures) is a list of publicly known cybersecurity vulnerabilities. Here’s what it does and doesn’t offer – and how it can help your organization’s security pros and other teams. When your organization is facing an...
The Critical Role of Endpoint Detection and Response
Executive Summary Security professionals, business decision makers, boards of directors, regulators and others are increasingly concerned about cybersecurity issues and the potential for major business disruptions like data breaches, various types of security...
Getting Started on Transforming Your Cybersecurity Posture
Getting Started on Transforming Your Cybersecurity Posture With breaches ever on the rise, cybersecurity is one of the highest priorities for virtually every enterprise. It is a frequent topic of C-suite and board discussions and has a ripple effect throughout the...







