Be wary of the latest AI-based email cybersecurity trends Rom Hendler March 2, 2023 Businesses must arm themselves with technologies that use AI- and ML-based tools to foil the latest email threats, taking the burden off employees.Read More
Organizations need a strategic approach to attack surface management Marc Gaffan March 1, 2023 An automated approach to security enables organizations to leverage their resources, minimizing attack surfaces and effectively addressing threats. Read More
AI can become the great equalizer to block phishing attacks Patrick Harr February 28, 2023 The best way to protect against phishing attacks is to put strong technical controls in place with AI that can augment fallible human behaviors.Read More
Fraud prevention practices to protect growing e-commerce retailers Rafael Lourenco February 27, 2023 Taking fraud prevention steps early on can make the path to growth safer for a retail business and smoother for its employees and good customers.Read More
How healthcare providers ensure safe and seamless continuity of care John Elms February 24, 2023 The growing number of successful cyberattacks has urged healthcare organizations to take steps in protecting their systems from threat actors. Read More
Mitigating employee rage Mike Lahiff February 24, 2023 It’s important for employers to take the threat of employee violence seriously and take steps to protect their customers and staff from harm. Read More
Integrate technology with security guard services for local businesses Adrian Smith February 24, 2023 For industries with security guard services, technology has opened the door to new opportunities, better coverage and more comprehensive protection.Read More
Protecting lone security workers Gen Handley February 24, 2023 While security leaders can’t predict future incidents, there are safety measures that can be taken now to protect security workers working alone. Read More
Humanizing security: Putting people first for stronger security Ken Fanger February 23, 2023 Humanizing security is a security approach that prioritizes the people that need the security more than the items that need to be protected. Read More
Reducing dwell time of threat actors requires a reactive workforce Julian Zottl February 21, 2023 Organizations need to be properly equipped to respond as quickly as possible to reduce how long an attacker has access to sensitive data. Read More