by Brian McCarthy | Jan 16, 2020 | 2020 elections, Artificial Intelligence, CASB, Cyber Resilience, Cybersecurity, Premium content, Ransomware, Security
Throughout 2019, we witnessed a number of record-breaking data breaches. Over 5,000 companies reported a data breach throughout the year, combining to compromise eight billion records. This unfortunate trend demonstrates two issues: cybercriminals are constantly...by Brian McCarthy | Jan 14, 2020 | Air Gapping, CASB, Cybersecurity, Email Security, Phishing, Premium content, Ransomware, Security
Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted. You may not be familiar with Microsoft Sway or at least have never used it. But cybercriminals have been exploiting this web app to send phishing...by Brian McCarthy | Nov 7, 2019 | Blog, Cybersecurity, Security
CVE (Common Vulnerabilities and Exposures) is a list of publicly known cybersecurity vulnerabilities. Here’s what it does and doesn’t offer – and how it can help your organization’s security pros and other teams. When your organization is facing an...by Brian McCarthy | Sep 11, 2019 | Endpoint Security, malware, Phishing, Security, Whitepaper
Executive Summary Security professionals, business decision makers, boards of directors, regulators and others are increasingly concerned about cybersecurity issues and the potential for major business disruptions like data breaches, various types of security...by Brian McCarthy | Aug 26, 2019 | Cybersecurity, Phishing, Premium content, Security
Getting Started on Transforming Your Cybersecurity Posture With breaches ever on the rise, cybersecurity is one of the highest priorities for virtually every enterprise. It is a frequent topic of C-suite and board discussions and has a ripple effect throughout the...by Brian McCarthy | Aug 17, 2019 | Cybersecurity, Phishing, Premium content, Security
Fighting Back Against Phishing and SPAM Email– 2020 Foresight 90% of cyber threats start with email, making it the #1 threat vector. Phishing attacks paired with impersonation techniques have made these email threats more sophisticated and harder to detect. In this...