• Alert Overload: False Positives’ Hidden Costs in Cybersecurity 

    Alert Overload: False Positives’ Hidden Costs in Cybersecurity 

    Let’s say you just bought a new house. Even though it’s in a gated neighborhood with security guards, you don’t want to risk anything, so you install a state-of-the-art security system. Every day, you get a flurry of alerts on your phone, triggered by your family coming and going through the front door, opening a…

  • Threat Attribution – Connecting the Dots to Empower Cybersecurity Defense 

    Threat Attribution – Connecting the Dots to Empower Cybersecurity Defense 

    In the realm of cybersecurity, threat attribution is akin to the investigative methods of the legendary detective Sherlock Holmes. Just as Holmes used his acute observation skills and deductive reasoning to pinpoint the perpetrator in a mystery, threat attribution involves meticulously analyzing cyberattacks to trace their origins and identify the attackers. In his classic form,…

  • DFIR To the Rescue – The Cybersecurity Joker 

    DFIR To the Rescue – The Cybersecurity Joker 

    Picture this: A person arrives at the office Monday morning, and panic sets in when he logs onto the company network. His screen displays an ominous message explaining the company’s files have been stolen and encrypted, and the company has 48 hours to make contact and pay a ransom or lose access forever. The man…

  • Retail’s Double-Edged Sword: Acceleration, Vulnerability, and Cybersecurity 

    Retail’s Double-Edged Sword: Acceleration, Vulnerability, and Cybersecurity 

    The retail industry has experienced a seismic shift in recent years, instigated by the COVID-19 pandemic and fueled by other industries rapidly digitizing their organizations. Adapting their businesses to e-commerce models was a lifeline for many retailers, but it also came at a cost: the broader the attack surface, the greater the vulnerability. Retail is…

  • Bolstering Your Cyber Armor: The Key Steps in Vulnerability Remediation 

    Bolstering Your Cyber Armor: The Key Steps in Vulnerability Remediation 

    After nearly a decade of relatively stable numbers, there was a dramatic spike in newly discovered common vulnerabilities and exposures (CVEs), going from just under 6,500 in 2016 to over 14,700 in 2017. Since then, the number has only grown exponentially. HackerOne’s ethical hackers identified a whopping 65,000 vulnerabilities last year. According to those hackers, the rapid pace…

  • Securing the Growing Attack Surface Introduced by IoTs

    Securing the Growing Attack Surface Introduced by IoTs

    Spurred by digitization and substantial advances in artificial intelligence (AI) and machine learning (ML), the number of Internet of Things (IoT) devices is increasing at breakneck speeds. Every minute, 7,620 new IoT devices are added to the Internet, and by 2030, there will be more than 29 billion connected IoT devices. While IoT devices enhance an organization’s efficiency…

Loading

Sign Up for Updates