SANS – The Five Most Dangerous Cyberattacks
According to SANS Institute Analysts, in today's interconnected world, cybersecurity has never been more critical. The sheer scale of cybercrime today, and the boldness of attackers, is hard for many business leaders to fathom – 450,000 new pieces of malware
ChatGPT-3 and now ChatGPT-4 — What Does it Mean for Cybersecurity?
We’ve been watching the evolution of ChatGPT, particularly the addition of GPT-4 which was officially announced on March 13, as of now, however, it’s only available in the ChatGPT Plus paid subscription. The current free version of ChatGPT will still
5 Cybersecurity Trends that will Impact the Industry in 2023
Let’s start this blog post with a look at the evolution and impact of cybercrime over the last year. According to estimates from Statista’s Cybersecurity Outlook, the global cost of cybercrime is expected to increase over the next five years, rising from
Cybersecurity vs. Cloud Security: What is the Difference? Part 1
Regarding technological advancement, cyber and cloud security are critical elements that can either make or break a company's overall IT infrastructure. Cybersecurity analysts must understand both nuances to protect their organization from potential risks. To get us started we know
‘BlackMamba’ AI-Keylogging Malware Attack Is Here – What You Need to Know
A new strain of malware has been discovered that is powered by artificial intelligence, and it's already making headlines in the cybersecurity community. Dubbed "BlackMamba," this keylogging attack has the potential to completely evade most existing endpoint detection and response
Will Your Organization Benefit from Security Services Edge (SSE)?
We want to keep things as simple as possible in this post about Security Services Edge (SSE); that is, what is SSE, what are the components, and what SSE is not. Fundamentally, SSE provides the security service elements of a
Defense Technologies Shaping Cybersecurity
Many people assume that cybercrime is a concept that’s only become a threat to businesses and individuals in the last decade. However, the seeds of cybercrime were sown back in the 1970s, before most people even had a computer. As we
Choosing the Right Security Services Provider
Managed Security Services – the Next Frontier Several weeks ago we wrote a blog post titled, “A Look at 2023’s Top 5 Cyber Risks – and Strategies for Defending Against Them;” we discussed the following Cyber Risk issues: Strategy 1: Build Your
A Look at 2023’s Top 5 Cyber Risks – and Strategies for Defending Against Them
Last month we wrote a blog post titled “Top 5 Cybersecurity Trends to Watch in 2023,” which discussed the following five trends: Trend 1: Threat Actors Are Preying on People’s Emotional State Trend 2: Exponential Ransomware: The Rise of Double
Building a Next-Generation Security Operations Center
Building an enterprise Security Operations Center (SOC) calls for careful planning and the precise coordination of people, processes, and technologies, as we covered in our previous post, 7 Steps to Building a Security Operations Center. However, once you’ve established a solid