Patching and multi-factor authentication are essential in protecting IoT devices.

Why You Need Timely Patching and Multi-Factor Authentication in the IoT

In this blog, we look at how patching and two-factor authentication/multi-factor authentication should be implemented in the Internet of Things.

A data breach isn't always the result of hackers' actions.

Prominent Data Breaches Highlight Dangers of Third-Party Vendors

Recently, much publicized breaches by Facebook, Panera, Best Buy and others represent various types of breaches, some of which expose the dangers of relying on third-party vendors for payment processing and other functions which require sharing customer records and sensitive company data.

Hackers go where the money is: the bank.

4 Cybersecurity Best Practices Financial Firms Should Live By

To avoid becoming another statistic, we recommend all financial institutions adhere rigidly to these four best practices:

Best Practices: How to Secure Your Internet-Facing Infrastructure Today

To address the challenges relating to your Internet-facing infrastructure, adopt these 5 best practices today and begin your journey.

Threat detection and response never stops.

Why Threat Monitoring Must Be 24/7/365

Threat detection and response is not a 9-to-5 process anymore. 

Malware is only one of many possible cyberattack types.

The Top 5 Cyberattack Vectors – How to Detect Them Before It’s Too Late

Most cyberattacks fall into a few major categories, such as malware, phishing and exploitation of outdated software.

Network segmentation can help contain IoT security risks.

Network Segmentation: A Key Measure for IoT Security

What is network segmentation, and how can it help with IoT security?

Who will claim the prize for the best security service?

SIEM vs MSSP vs MDR: A Showdown

Three security solutions enter; one security solution leaves. 

Contractor Threat blog image

Incoming Cyber Risk: How Your Contractors Can Undermine Your Security

When you think about it, it’s not surprising that contractors pose one of the biggest risks to your organization’s security.

More SaaS apps are unapproved than approved by IT.

Shadow IT: Risks Associated with SaaS App Usage in SMEs

Shadow IT is fundamentally a visibility problem that creates unnecessary risks for SMEs.