407-416-7955 info@cherubas.com
Select Page

Who has time to read the the countless product fliers, brochures, or watches vendor webinars.  But I do make time to read the Cherub cyber-blogs.  They are following (and most of the time are ahead of) the industry trends in cybersecurity and data protection while boiling it all down to easy reading.

Cindy Kelly

Security Manager, University of Georgia

The Critical Role of Endpoint Detection and Response

The Critical Role of Endpoint Detection and Response

  Executive Summary   Security professionals, business decision makers, boards of directors, regulators and others are increasingly concerned about cybersecurity issues and the potential for major business disruptions like data breaches, various types of security...

read more
Breach Avoidance: It Can Be Done, It Needs to Be Done?

Breach Avoidance: It Can Be Done, It Needs to Be Done?

Despite the Hype, Most Breaches Are Avoidable There is no shortage of horror stories about cybersecurity. Almost daily the press reports yet another exposure of sensitive business and customer information, or business outages caused by ransomware or denial of service...

read more
CISOs Say Cyberattacks Are Outpacing Their Defenses

CISOs Say Cyberattacks Are Outpacing Their Defenses

  In a recent survey conducted by Fortinet, more than 80% of CISOs surveyed believe that the risk of cyberattacks is increasing. Worryingly, almost a quarter of those also believe the attacker’s capabilities surpass their own abilities to defend against them. When...

read more
U.S. Wary of a Ransomware Attack Against 2020 Election

U.S. Wary of a Ransomware Attack Against 2020 Election

  A report this week confirmed that the U.S. government is concerned about foreign hackers spreading ransomware that can manipulate voter databases ahead of next year's election. #protect2020   Fearing the repercussions of a ransomware attack against the next...

read more
Getting Started on Transforming Your Cybersecurity Posture

Getting Started on Transforming Your Cybersecurity Posture

  Getting Started on Transforming Your Cybersecurity Posture With breaches ever on the rise, cybersecurity is one of the highest priorities for virtually every enterprise. It is a frequent topic of C-suite and board discussions and has a ripple effect throughout the...

read more
Fighting Back Against Phishing and SPAM Email

Fighting Back Against Phishing and SPAM Email

  Fighting Back Against Phishing and SPAM Email– 2020 Foresight 90% of cyber threats start with email, making it the #1 threat vector. Phishing attacks paired with impersonation techniques have made these email threats more sophisticated and harder to detect. In this...

read more
Top 5 Cloud Security Myths Debunked

Top 5 Cloud Security Myths Debunked

  Five years ago, almost every organization on earth appeared to be just weeks away from moving all workloads into the cloud—or at least it seemed that way. But reality has moved at a far more measured pace. Instead of a ubiquitous, all-in phenomenon, most...

read more