Three Email Threats That Are Hardest to Detect

Three Email Threats That Are Hardest to Detect

There’s a question that all organizations need to be asking themselves when it comes to securing their email security posture: Do my users know how to distinguish between a legitimate email and an email threat? Some businesses are able to invest heavily in security...
Report: The State of Industrial Security in 2022

Report: The State of Industrial Security in 2022

Security for the industrial internet of things (IIoT) and operational technology (OT) is in its infancy in many organizations. Several factors — including security incidents — are driving awareness and improvements. There’s certainly plenty of room for both,...
Seven Cybersecurity Questions Boards Need to Ask

Seven Cybersecurity Questions Boards Need to Ask

For every new technology that cybersecurity professionals invent, it’s only a matter of time until malicious actors find a way around it. We need new leadership approaches as we move into the next phase of securing our organizations. For Boards of Directors (BODs),...
Why LinkedIn is as Dangerous as it is Useful

Why LinkedIn is as Dangerous as it is Useful

Everybody uses LinkedIn. Everybody. I mean, at last count the site had 722 million subscribers. That’s what makes the site so incredibly useful for networking, job hunting, recruiting, and promoting your business. It’s also what makes LinkedIn a huge security threat....