3 questions CISOs need to ask themselves to protect your data
While the cybersecurity industry has always been marked by changing trends and the sudden debut of new technologies, the pace of change is accelerating. In the last... Read more.
Data security and its benefits for small businesses
Cyber threats not only affect large companies and governments, they can also affect small businesses. According to research, nearly half of small businesses have... Read more.
What is Network Discovery?
While we would all like to think that our networks are perfectly maintained and documented, the reality is that sometimes you lose track of them. In some cases,... Read more.
How to use KPIs to generate results in Cybersecurity?
Obtaining investment from business leaders to create a mature cybersecurity program and fund initiatives is imperative to success in enterprise risk mitigation.... Read more.
Extended Detection and Response (XDR), what does it really consist of?
You’ve probably read an article, watched a talk or listened to a webinar about what the term XDR, also known as extended detection and response, is. The cyber... Read more.
How SIEM correlation rules work
SIEM is a powerful security tool when implemented correctly. Network security devices such as IDS devices, IPS devices and firewalls generate a large number of logs.... Read more.
What is a cybersecurity strategy and how can a company develop one?
The number of users, devices and resources on enterprise networks is growing exponentially. With this expanding attack surface, a company’s assets, intellectual... Read more.
Reasons why we see more ransomware attacks than ever before
Cybersecurity specialists have noted several worrying trends over the past year, with ransomware being one of the most. Admittedly, this is far from a new problem,... Read more.
What is an advanced persistent threat?
As the threat landscape evolves faster than we can keep up with, organizations need to be aware of the type of threats they may face. Certain types of threats, such... Read more.
How can DPI be used in security?
After the last post where we learned about deep packet inspection (DPI), we will talk about how this tool can be used in security products such as redborder. 1.... Read more.