Blog
Discover what’s new
Our latest thought pieces

Mercenary Hackers a Major Threat In the EU
As it turns out, ransomware might not be the most significant security threat facing the world as we move into the New Year. Per Reuters,

Flipping the Script: How Security Researchers Cost a Ransomware Developer Millions of Dollars
The battle between infosec and hackers isn’t always uphill for the former. Occasionally, the good guys experience a huge win. This is one of those times.

Could Artificial Intelligence Solve the Ransomware Epidemic?
Ransomware is one of the oldest attack methods on the web. The emergence of artificial intelligence in the security space could be key to defeating it.

Why Cyber Resilience is Crucial in a Post-Pandemic World
The world has changed. It’s no longer enough to simply secure our systems. We need to think about what we’ll do when they’re inevitably attacked.

What Is Cyber Immunity, and Why Does It Matter?
Reactive cybersecurity simply doesn’t work. Not anymore. That’s where cyber immunity comes in. We’ll discuss what it is and why it matters so much today.

What Your Business Can Learn From the SEC’s Cybersecurity Best Practices
The U.S. Securities and Exchange Commission recently published a new set of guidelines intended to help firms enhance both their operational resilience and security preparedness. Although this framework is intended primarily for the securities market, it nevertheless holds a great deal of value for organizations in any industry.

One of Russia’s Top Security Professionals Has Been Charged With Treason
Ilya Sachkov has been arrested on charges of treason, accused of undermining Russia’s national interests. Here’s why this is concerning.

China Has Banned Cryptocurrency. Here’s How This May Impact The Cybersecurity Sector
China has officially made all cryptocurrency illegal. Unsurprisingly, this has already had far-reaching consequences. But the greatest impact is yet to be seen.

3 Identity and Access Management Best Practices You Can’t Afford to Ignore
Traditional authentication isn’t intended for distributed work. You need identity and access management. Here are a few things to keep in mind about that.