Category: Blog RSS Feed

Getting Email Security Right

Let’s face it: your inbox is a warzone. Email security is a constant battle between evolving threats and the defenses designed to stop them. Every day, attackers bombard user inboxes with increasingly sophisticated phishing attempts, malware, and social engineering attacks.…

APT Rogues’ Gallery: The World’s Most Dangerous Cyber Adversaries

Advanced Persistent Threat (APT) groups are not a new scourge. These sophisticated, state-sponsored cyber adversaries, with deep pockets and highly advanced technical skills, conduct prolonged and targeted attacks to infiltrate networks, exfiltrate sensitive data, and disrupt critical infrastructure. The stakes…

Best Practices for Transitioning from Security to Privacy

As global privacy requirements evolve, many information security professionals are called upon to enhance or lead information privacy programs. While this transition may seem like a natural progression, I learned five important lessons when I moved from a focus on…

Cyber Fraud: The Primary Culprit in UK Payment Fraud

Cyber fraud has skyrocketed from a growing concern to the leading driver of payment fraud in the UK, infiltrating most businesses in the country and exposing them to previously unimagined financial and operational risks. This was one of the findings…