Arctic Wolf’s CEO Plays Nostradamus: Brian NeSmith’s Cybersecurity Predictions for 2019

So, what will 2019 bring? In a recent webinar, Arctic Wolf’s CEO Brian NeSmith offered key insights on the state of cybersecurity today and his predictions for 2019.

JW Marriot logo on device

Marriott Breach Exposes 500 Million Guest Records: Preliminary Lessons

On Friday, Marriott International announced its Starwood reservation system’s database had been hacked and personal details from up to 500 million guest records were compromised.

Debunking Cybersecurity Myths: Part II—Sorry, the Cloud Won’t Save Us

We now move from age-old to brand-new in this episode and address the growing misconception around an increasing shift to cloud services.

Debunking Cybersecurity Myths: Part I—No, Really, Antivirus Is Dead

Practices from the 90’s don’t have the same place in today’s hyperconnected world. Like antivirus solutions. Here’s why:

A few simple steps can go a long way toward better cybersecurity.

Steps to Improve Cyber Awareness in Your Organization

Better cybersecurity starts with exemplary security hygiene. Here are a few tips to get you where you’re going. 

Security experts help businesses stop threats in their tracks.

How Cybersecurity Professionals Serve Businesses

The most crucial infosec function is “security operations,” and in particular, threat detection and incident response.

2 terabytes of data have been compromised, affecting as many as 340 million people.

Don’t Be the Next Exactis: How Your Firm Can Avoid a Damaging Data Breach

Exactis has exposed a projected 340 million records by storing them on a public-facing server.

The IoT creates many new vulnerable connections.

How Continuous Monitoring and SOC-as-a-Service Secure IoT-Connected Devices

In the final part of this series on IoT security, we examine the roles of 24/7 monitoring and security operations centers.

Patching and multi-factor authentication are essential in protecting IoT devices.

Why You Need Timely Patching and Multi-Factor Authentication in IoT

In this blog, we look at how patching and two-factor authentication/multi-factor authentication should be implemented in the Internet of Things.

Hackers go where the money is: the bank.

Four Cybersecurity Best Practices Financial Firms Should Live By

To avoid becoming another statistic, we recommend all financial institutions adhere rigidly to these four best practices: