banner-blog.jpg

BLOG

Five Cloud Security Considerations for CISOs

Posted by Kowsik Guruswamy on Oct 8, 2020

Discover How You Can Protect Users and the Organization in Today’s New Normal

The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower distributed users with the tools and information they need to keep businesses running. Now everyone is accessing everything from everywhere, with limited control and visibility into who is accessing what, where, and on what device.

Read More

Tags: cybersecurity, phishing, spearphishing, cyberattacks, Web Security, HTTPS, SaaS, cloud security, VPN, email security, new normal, cloud apps, BYOD

Stop Phishing With Technology AND Training

Posted by Jay Kelley on Aug 17, 2017

While Black Hat USA 2017 ended three weeks ago, I wanted to share my thoughts and experiences on my very first Black Hat USA 2017 after being in security for 15+ years. 

Read More

Tags: malware, cybersecurity, isolation, ransomware, credential theft, cyber theft, black hat, cyber attacks, cyber training, authentication and application security, spearphishing, Black Hat Conference, Ichthyology, phishing training, phishing attacks

Connect with us

Lists by Topic

see all

Recent Posts