HomeCybersecurity

Cybersecurity

Understanding the Business Costs of Phishing Attacks

Phishing attacks—where hackers try to collect personal information using deceptive emails and links—continue to impact organizations of all sizes. It’s been well documented that phishing...

Sophos CTO Joe Levy on AI in Cybersecurity

I spoke with Joe Levy, CTO at Sophos, about the challenges and potential for artificial intelligence in cybersecurity. Far more transparency about AI tools...

Report: Cybercriminals Use Cloud for DDoS Attacks

Over the past couple of years there has been a significant focus on phishing, ransomware and other threats that attack online users. While this...

Cybersecurity: Winning the Battle Starts with the Front Lines

According to the Verizon 2021 Data Breach Investigations Report (DBIR), a total of 5,258 verified data breaches happened in 16 industries and four distinct...

Skillsoft’s Mike Hendrickson on Burnout among Cybersecurity Professionals

I spoke with Mike Hendrickson, VP of Tech & Dev Products for Skillsoft, about the challenge facing cybersecurity professionals: given the difficulties of the...

Zscaler Uses Integrated Platform to Combat Ransomware

Ransomware is on the rise and it’s coming from multiple sources. Additionally, whether the goal is to collect ransom for data or disrupt a...

AWS’s Ryan Orsi on Cloud Security

I spoke with Ryan Orsi, Worldwide Partner Lead, Security, at AWS, about handling cloud security issues, and news updates on AWS cloud security. Among the...

Security Startups Focus on 3 Key Areas

The RSA Conference is the industry’s biggest cybersecurity show, and it hosts the premier startup competition, Innovation Sandbox. In the competition, 10 entrepreneurs pitch...

DigiCert Simplifies Implementing Digital Trust

The world is more interconnected than ever, which is blurring the lines between work and personal connectivity. For organizations, taking a strategic approach toward...

ArcSight vs. Splunk: SIEM Tool Comparison 2022

Micro Focus ArcsSight and Splunk operate in the Security Information and Event Management (SIEM) space. Both offer broad monitoring and analytics of security incidents,...