Who has time to read the the countless product fliers, brochures, or watches vendor webinars. But I do make time to read the Cherub cyber-blogs. They are following (and most of the time are ahead of) the industry trends in cybersecurity and data protection while boiling it all down to easy reading.
Security operations center: Build vs. Buy, which solution is right for you?
HOW WILL YOU PROTECT AGAINST TODAY’S CYBER THREATS? As cyber-attacks become more frequent and more devastating, many organizations are quickly devising plans to protect against inevitable threats that could jeopardize their business. Larger enterprises typically...
What Is EDR and How Does It Fit Into Your Security Strategy?
Back in 2013, Gartner's Anton Chuvakin set out to name a new set of security solutions that sniff out suspicious activity on endpoints. After what he called “a long agonizing process that involved plenty of conversations with vendors, enterprises, and other analysts,"...
How organizations can best succeed with their cybersecurity resolutions
Throughout 2019, we witnessed a number of record-breaking data breaches. Over 5,000 companies reported a data breach throughout the year, combining to compromise eight billion records. This unfortunate trend demonstrates two issues: cybercriminals are constantly...
How cybercriminals are using Microsoft to launch phishing attacks
Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted. You may not be familiar with Microsoft Sway or at least have never used it. But cybercriminals have been exploiting this web app to send phishing...
Preparing for Iranian Cyberattacks: An Overview of Recent Threat Activities
Executive Summary The death of Qasem Soleimani by a U.S. airstrike increases the likelihood that Iran will seek to retaliate against U.S. assets using destructive malware. However, given the complexity of attacks, timing of any potential action is uncertain.APT33's...
Information Security: Your People, Your First Line of Defense
A company can put together as many technology solutions or policies as it likes, but, in the end, its people are the most important element in information security. If the employees in your organization don’t feel personally invested in improving your organization’s...
Phishing scams top the threat list
A staggering 96% of organizations say that e-mail phishing scams pose the biggest security risk facing their businesses over the next year. A further three quarters (76%) say the greatest and most persistent threat is the careless insider who unthinkingly clicks on...
Top Reasons for Backing-up Office 365 is Critical
Every business, especially the Enterprise, is grappling with the challenges of moving to the cloud. It isn’t a matter of IF, but a matter of WHEN and HOW. For tens of thousands of organizations, the WHEN is Today and the HOW is with Druva. Recently our adoption...
How to explain CVE, Common Vulnerabilities and Exposures, in plain English
CVE (Common Vulnerabilities and Exposures) is a list of publicly known cybersecurity vulnerabilities. Here’s what it does and doesn’t offer – and how it can help your organization’s security pros and other teams. When your organization is facing an...