Back to homepage
Industry Insights

Fake News, Real Cybersecurity Risks

From fake outlandish crime stories to the reporting of fake stories tied to real events and suspected government manipulation, there was so much fake news in 2017 that the Collins Dictionary made


The Next Big Cyber-Attack Vector: APIs

With cyber-attacks on enterprise networks becoming more sophisticated, organizations have stepped up perimeter security by investing in the latest firewall, data and endpoint protection, as well as intrusion prevention technologies.


Two-Factor Inauthentication – The Rise In SMS Phishing Attacks

There are countless ways to carry out a cyber attack, but for the vast majority the key is deception – typically involving identity deception in which the attacker poses as


The Threat Of Online Attacks On National Security Has Soared

News broke earlier today that Ciaran Martin from the National Cyber Security Centre warned the threat of cyberattacks on Britain’s critical national security infrastructure from hostile states like Russia and


Cybercriminals will gravitate to criminal activity that maximizes their profit

McAfee released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware, and other threats in Q1 2018. McAfee Labs saw on average five new


Cryptocurrency miners poised for continued growth

WatchGuard threat intelligence from Q1 2018 revealed that 98.8 percent of seemingly common Linux/Downloader malware variants were actually designed to deliver a popular Linux-based cryptocurrency miner. This is just one of several


In Bots We Trust: Better Enterprise Security Through AI

Security has always been important to the enterprise, unfortunately, it’s also been mired in the confusion of keeping up with trends and balancing consumer preferences. Now these issues are finally

Industry Insights

4 cybersecurity trends for 2018

Be ready for when the future arrives, start monitoring a pipeline of emerging technologies. Have you ever wanted to watch new technology develop years before it attains mass appeal? Or


10 Tips for More Secure Mobile Devices

Mobile devices can be more secure than traditional desktop machines – but only if the proper policies and practices are in place and in use. Computing and mobile computing are,

Identity Theft

Identity verification: Staying ahead of post-breach era consumer preferences

In the wake of numerous high-profile data breaches and privacy incidents, consumers are increasingly concerned about the security of their identities and what companies are doing to keep them safe.