Cybersecurity Awareness Month: The Evolution of Ransomware

Cybersecurity Awareness Month: The Evolution of Ransomware

This Cybersecurity Awareness Month, join GuidePoint Security for A Voyage Beyond the Horizon, a speculative exploration of possible scenarios that […] ...
Detecting a Phishing Email: 10 Things to Watch

Detecting a Phishing Email: 10 Things to Watch

As security professionals, we remain vigilant in identifying phishing attempts and actively seek information on defending against ransomware and phishing attacks. These topics hold paramount importance within the security community. It is ...
threat simulation exercises

The Human Factor in Threat Simulation: Testing Employee Awareness and Training Effectiveness

As businesses increasingly rely on technology to store and manage sensitive information, the risks associated with cyber attacks continue to rise. While many companies invest in top-of-the-line security software and hardware, the ...
What can you do with an SBOM today?

What can you do with an SBOM today?

Software Bill Of Materials BlueprintWe can all agree that computer software is a complicated construct composed of numerous diverse components. Open-source software is becoming ever more common as a building block in ...
An image illustrating defending a Ci/Cd pipeline

From Vulnerability to Victory: Defending Your CI/CD Pipeline

Automated CI/CD (Continuous Integration/Continuous Delivery) pipelines are used to speed up development. It is awesome to have triggers or scheduling that take your code, merge it, build it, test it, and ship ...
resignation distributed workspaces

Countering Insider Threats as the Great Resignation Continues

According to Fortune Magazine, 40% of U.S. employees are considering an exit from their current place of business. This trend, which has been termed The Great Resignation, creates instability within organizations. High ...
Security Boulevard
LoginRadius Celebrates National Cybersecurity Month 2022 - Here’s Everything You Should Know

LoginRadius Celebrates National Cybersecurity Month 2022 – Here’s Everything You Should Know

The global cybersecurity threat vector has increased exponentially, and governments across the globe are encouraging people to take accountability to improve their digital privacy. LoginRadius pledges to spread awareness about National Cybersecurity ...

See Yourself in Cyber: 4 Steps to Stay Safe

As threats to technology and private information become more frequent, the President of the United States and Congress have proclaimed October to be Cybersecurity Awareness Month. This initiative aims to assist people ...

How to Clean up the Tool-Sprawl Mess

Editor’s Note: This a partnered sponsored guest blog written by Cadre See a problem, throw a technology at it. See another problem, throw another technology at it. According to a global survey ...

The Art and Science of Threat Hunting – A Guide to Preventing Cyberattacks

Editor’s Note: This a partnered sponsored guest blog written by Avertium. What is threat hunting? Cyber threat hunting is a proactive cybersecurity strategy that searches through networks to detect and isolate advanced ...