Who has time to read the the countless product fliers, brochures, or watches vendor webinars. But I do make time to read the Cherub cyber-blogs. They are following (and most of the time are ahead of) the industry trends in cybersecurity and data protection while boiling it all down to easy reading.
The Critical Role of Endpoint Detection and Response
Executive Summary Security professionals, business decision makers, boards of directors, regulators and others are increasingly concerned about cybersecurity issues and the potential for major business disruptions like data breaches, various types of security...
Breach Avoidance: It Can Be Done, It Needs to Be Done?
Despite the Hype, Most Breaches Are Avoidable There is no shortage of horror stories about cybersecurity. Almost daily the press reports yet another exposure of sensitive business and customer information, or business outages caused by ransomware or denial of service...
CISOs Say Cyberattacks Are Outpacing Their Defenses
In a recent survey conducted by Fortinet, more than 80% of CISOs surveyed believe that the risk of cyberattacks is increasing. Worryingly, almost a quarter of those also believe the attacker’s capabilities surpass their own abilities to defend against them. When...
U.S. Wary of a Ransomware Attack Against 2020 Election
A report this week confirmed that the U.S. government is concerned about foreign hackers spreading ransomware that can manipulate voter databases ahead of next year's election. #protect2020 Fearing the repercussions of a ransomware attack against the next...
Getting Started on Transforming Your Cybersecurity Posture
Getting Started on Transforming Your Cybersecurity Posture With breaches ever on the rise, cybersecurity is one of the highest priorities for virtually every enterprise. It is a frequent topic of C-suite and board discussions and has a ripple effect throughout the...
What is Cyber Resilience? And Why Should You Air Gap Your Enterprise
Sure, you’ve prepared for attacks and breaches, but how well can key business processes function when a crisis hits? Simply put, cyber resilience is a measure of how well an organization can operate its business during a data breach or cyber attack. Security teams...
Fighting Back Against Phishing and SPAM Email
Fighting Back Against Phishing and SPAM Email– 2020 Foresight 90% of cyber threats start with email, making it the #1 threat vector. Phishing attacks paired with impersonation techniques have made these email threats more sophisticated and harder to detect. In this...
Top 5 Cloud Security Myths Debunked
Five years ago, almost every organization on earth appeared to be just weeks away from moving all workloads into the cloud—or at least it seemed that way. But reality has moved at a far more measured pace. Instead of a ubiquitous, all-in phenomenon, most...
Top 4 Questions all CISOs Need to Ask About Enterprise Cybersecurity
Effective internal cybersecurity depends on chief information security officers (CISOs) and other security leaders knowing exactly what’s happening on their network and how it impacts overall protection. The problem is that when things are running smoothly, it’s...