by Brian McCarthy | May 21, 2019 | Email Security, Endpoint Security, Phishing, Premium content
Do you know your spear phishing and vishing from your whaling and clone phishing? We explain how to recognize each type of threat. Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch fraudulent...by Brian McCarthy | May 16, 2019 | CASB, Cybersecurity, Data Breach, Premium content, Report
Regardless of the industries in which they operate, most organizations handle some type of sensitive data, like PII (personally identifiable information). If this information is not protected correctly, the resulting breaches can harm innocent people and, in many...by Brian McCarthy | May 6, 2019 | Cloud, Data Protection, DRaaS, Premium content, Ransomware
Are you ready for a ransomware attack? Being prepared will have a huge impact on how effectively your company can recover. Ransomware attacks have become commonplace, affecting all types of industries worldwide. Learn why ransomware is a serious risk and get...by Brian McCarthy | Apr 30, 2019 | Artificial Intelligence, Cybersecurity, Endpoint Security, Premium content, Webinars
About this webinar On-demand, 45 mins. Universities are tempting targets for cybercriminals. They host extensive IT infrastructure, perform cutting edge research, and deal with large sums of money. Nation-state threat actors are drawn to the valuable intellectual...by Brian McCarthy | Apr 26, 2019 | CASB, Case Studies, Cloud, Cybersecurity, Data Breach, Premium content
Migration to the cloud presents many unique challenges in protecting your data. A new generation of technologies called Cloud Access Security Brokers (CASBs) has emerged with the sole purpose of protecting corporate data while embracing cloud applications and...by Brian McCarthy | Apr 24, 2019 | CASB, Case Studies, Cloud, Cybersecurity, Data Breach, Premium content
CASB — cloud access security broker — it’s the fastest growing security category ever — or so Gartner has claimed. And in the age of the cloud, in the age of data, security takes on a new level of importance but also complexity. Take the castle There was a time when...