Ransomware Takes Center Stage As A Major Corporate Cyber Security Risk It’s 9:30am. You’ve gotten your morning coffee, checked your email, and now you are surfing the web when all of Ben Zilberman |April 14, 2016
Sustained Vigilance Key for Financial Services Organizations in Light of Stable, Steady Threat Landscape Every year when we publish our Global Application & Network Security Report, one of the most popular aspects of the Ben Desjardins |April 07, 2016
The Stages of Online Business Transformation Come With Benefits... and Risks As a father of teenaged children, I sometime marvel at the level of network-connectedness of that younger generation. It is Ben Desjardins |March 31, 2016
When Trends Collide - Ransomware and IoT Attacks Continue A highlight of the annual Global Network & Application Security Report is always the deep case studies. Each year, we Ben Desjardins |March 08, 2016
Could Your Network Survive APDoS or Hit-and-Run DDoS? Can you guess where a network breach first occurs?When a CISO asked this question during a recent business trip my Ben Zilberman |February 25, 2016
Cyber-Attackers Are Adjusting to the Security Adjustments You've Made Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase Ben Desjardins |February 16, 2016
Is Your Organization Prepared for Cyber Attacks? The 2015-2016 Global Application & Network Security Report Few organizations are well prepared when it comes to cyber-attacks.Blending statistical research and front-line experience, and with more than 20 Shira Sagiv |January 19, 2016
Ways to Protect Against Modern Day Spear Phishing Anyone who works in the cyber-security field knows that phishing attacks – especially those against large enterprises – are on Snir Karat |January 13, 2016
For Financial Services, An Outage May Be Preferable to This It is easy to know when there is an outage. Things do not work, people complain, and businesses lose money. Frank Yue |January 05, 2016
Climbing the security and personal mountain in 2016 For my last blog in 2015 I'd like to address a very personal topic that has a lot in common Werner Thalmeier |December 21, 2015
Security Messaging Can Speed Up Your Fight Against Cyber-Attacks Cyber-attacks are no longer stories for technical journals – they are now front page news.These attacks are being carried out Prakash Sinha |December 15, 2015
SSL Breaks Bad: A Protective Technology Turned Attack Vector It’s an unfortunate reality that things meant to do good can and do get misused for harm.Consider the myriad stories Ben Desjardins |December 10, 2015