Who has time to read the the countless product fliers, brochures, or watches vendor webinars. But I do make time to read the Cherub cyber-blogs. They are following (and most of the time are ahead of) the industry trends in cybersecurity and data protection while boiling it all down to easy reading.
Monster-Sized Breaches Are Disasters for Your Enterprise
Regardless of the industries in which they operate, most organizations handle some type of sensitive data, like PII (personally identifiable information). If this information is not protected correctly, the resulting breaches can harm innocent people and, in many...
You Aren’t Paying Attention If You Aren’t Scared of Ransomware
What do the City of Atlanta and Baltimore, Hancock Health, the Chicago Police Department, Boeing, and Finger Lakes Health all have in common? Ransomware. These extortion style attacks target small and large businesses, from government to healthcare and everything in...
List of data breaches and cyber attacks in April 2019 – 1.34 billion records leaked
We would’ve been talking about an extraordinarily low number of breached records this month if it hadn’t been for a string of incidents in India, another Facebook gaffe and a massive blunder in China, in which a series of companies exposed almost 600 million...
You’ve Got Ransomware. Now What?
Are you ready for a ransomware attack? Being prepared will have a huge impact on how effectively your company can recover. Ransomware attacks have become commonplace, affecting all types of industries worldwide. Learn why ransomware is a serious risk and get...
How cybercriminals hold data hostage… and why the best solution is often paying a ransom
Targets have included hospitals and municipalities, but the FBI says anyone on the internet should expect to be attacked by cybercriminals. The cities of Newark, Atlanta, and Sarasota have been hit. So have Cleveland's airport and San Francisco's transit authority....
Georgia State University now using advance AI to secure their endpoints!
About this webinar On-demand, 45 mins. Universities are tempting targets for cybercriminals. They host extensive IT infrastructure, perform cutting edge research, and deal with large sums of money. Nation-state threat actors are drawn to the valuable intellectual...
Cylance 2019 Cyber Security Threat Report
In 2018, Cylance® observed a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to...
What is an acceptable failure rate for phishing?
Phishing has long been the proverbial thorn in an organization’s side. It doesn’t have the glitz and glamor of many other headline-grabbing hacks, such as the latest zero-day or ransomware attack. It’s been around so long it has become old news, pushed aside and...
Major CASB Use Cases for Securing Your Cloud
Migration to the cloud presents many unique challenges in protecting your data. A new generation of technologies called Cloud Access Security Brokers (CASBs) has emerged with the sole purpose of protecting corporate data while embracing cloud applications and...