How to Combat Advanced Persistent Threats

Imagine the following Security Operations (SecOps) scenario. A large organization conducts regular audits of its security controls. It monitors a collection of intrusion detection appliances and [...]

How Is Your Enterprise IT Hygiene?

We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene in cybersecurity. Good. What is that, anyway? An IT hygiene definition should start with the meaning [...]

5 Steps to Protect Your Business During This Summer

Finally,  your much-deserved summer vacation is about to commence. You and your colleagues prepared your office for downtime,  managed last-minute tasks and set up your automatic reply. So, [...]

Is there finally a way to tame APTs?

With the increasing sophistication of Advanced Persistent Threats (APTs), it’s crucial to stay up-to-date on the latest, most advanced cybersecurity technologies.