by Brian McCarthy | Apr 24, 2019 | CASB, Case Studies, Cloud, Cybersecurity, Data Breach, Premium content
CASB — cloud access security broker — it’s the fastest growing security category ever — or so Gartner has claimed. And in the age of the cloud, in the age of data, security takes on a new level of importance but also complexity. Take the castle There was a time when...by Brian McCarthy | Apr 21, 2019 | Artificial Intelligence, Blog, Cybersecurity, Data Breach, Email Security, Endpoint Security, malware, Phishing, Ransomware, Security
Hacker groups going after government domains Security researchers are suspecting state-sponsored actors. Imagine typing in a government internet address, and ending up on a website that looks like a government website, acts like a government website, but steals your...by Brian McCarthy | Apr 19, 2019 | Artificial Intelligence, Cybersecurity, Data Breach, Premium content
The city of San Antonio is licensing software to enable its cybersecurity team to secure its internal computer network. The City Council on April 18 approved a 5-year contract of $670,620 contract that runs through 2024 with a local Austin-based technology...by Brian McCarthy | Apr 4, 2019 | Blog, Cybersecurity, Data Breach, Email Security, Phishing
Hackers broke into university networks in just two hours Penetration testers testing university networks were able to use phishing emails to gain administrator access and access personal data, financial information and confidential research. Ethical hackers testing...by Brian McCarthy | Apr 3, 2019 | Cybersecurity, Data Breach, Premium content, SIEM
Security Information and Event Management (SIEM) is a key enterprise security technology, with the ability to tie systems together for a comprehensive view of IT security. While each vendor has its own take on SIEM, Gartner lists the primary features for...by Brian McCarthy | Apr 1, 2019 | Cybersecurity, Data Breach, Data Classification, Premium content, Security, Solution Brief
“The convergence of business and security is why I think Security Instrumentation is so exciting.” Report: The Urgent Need for Security Instrumentation Detroit-based cybersecurity research analyst and bestselling author Richard Stiennon...