How Chatbots Can Help Bridge Business Continuity and Cybersecurity

A quick web search for “chatbots and security” brings up results warning you about the security risks of using these

Read more

SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT

Between late March and mid-April 2020, IBM X-Force Incident Response and Intelligence Services (IRIS) uncovered a phishing campaign targeting small

Read more

Workforce Versus Consumer IAM: Key Differences and Use Cases

As a consumer, have you ever visited an online retail site only to be bombarded by a pop-up window asking

Read more

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s

Read more

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government in the U.S. have increased dramatically over the last several years. In 2019 alone, ransomware affected

Read more

Connected Car Security Is a New Kind of Mobile Security Risk

Earlier this year, we published a piece about the need for a cybersecurity wake-up call in the automotive industry. The

Read more