Safeguarding Healthcare for the Future With Zero Trust Security

In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020,

Read more

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively

Read more

How Deepfakes Will Make Us Question Everything in 2020

We’ve written about deepfakes before, but there’s one overlooked side effect that must be brought to our attention: As the

Read more

How to Protect Your Organization From Evolving Phishing Attacks

Phishing remains one of the top threats to enterprise IT. According to a recent Akamai report, “Phishing Is No Longer

Read more

What Are Insider Threats and How Can You Mitigate Them?

What is an insider threat? Insider threats are users with legitimate access to company assets who use that access, whether

Read more

How to Start Building an Insider Threat Program

Sometimes, it only takes one moment — one life-changing incident — for the most trustworthy employee to become an insider

Read more

Can Authentication Negatively Impact the User Experience?

Authentication can sometimes feel like a balancing act. On one hand, securing your digital experience is a top priority. Preserving

Read more

What Are Advanced Persistent Threats (APTs), and How Do You Find Them?

As organizations grapple with the explosion of new and novel threats, they are often constrained by both time and resources

Read more

Set Expectations and Boundaries With Your Security Program to Minimize Risk

As a consultant, I’ve seen some excellent information security programs over the years — from the latest and greatest technical

Read more