To Rank or Not to Rank Should Never Be a Question

Let’s face it: Vulnerability management is not what it used to be a decade ago. Actually, it is not what

Read more

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government in the U.S. have increased dramatically over the last several years. In 2019 alone, ransomware affected

Read more

Increase Automation to Overcome Cyber Resilience Challenges

Security operations teams face an exponentially growing volume of security event data while resources mostly remain static. One great way

Read more

Sextortion Scams Delivered by Emotet Net 10 Times More Than Necurs Sextortion — Here’s Why

Recent spam campaigns from Emotet featured sextortion content very similar to emails previously sent by the Necurs botnet. However, Emotet

Read more

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global

Read more

How to Create Value With Your (Security) Data Analytics Program

I have been fascinated by data analytics for all my professional life — from my early days of using Linux

Read more