Ransomware has a new driver: zero-day exploits Read on to find out how ransomware gangs are using zero-days, and what your organization can do to stop them. 14 minutes
How to protect against Living Off the Land attacks Read on to learn more about LOTL attacks, including the most commonly-abused tools, how to detect stealthy LOTL tactics, and… 11 minutes
Ransomware reinfections on the rise: why and how to stop them Read on to learn how to avoid remediation mistakes, prevent multiple cyberattacks, and keep cyber enemy #1 out of your… 14 minutes
ChatGPT: Cybersecurity friend or foe? Read on to learn more about the pros, cons, conversations, and controversies surrounding ChatGPT, including a call to (halt) action… 18 minutes
Do cyber regulations actually make K–12 schools safer? — Navigating compliance while securing school and student data In the article, I highlight recommendations from key security standards, including the most recent state and federal laws passed to… 13 minutes
2023 prediction: Security workforce shortage will lead to nationally significant cyberattack Read on for advice on how to attract and retain diverse security talent, as well as when to turn to… 9 minutes
Why security awareness is crucial for all employees this CSAM Read on to learn more about the impact of awareness programs on organizations’ security postures, as well as how to… 8 minutes
Ransomware on a roll through Q2, poised to sustain summer attacks Read on for advice about ransom payment protocols, as well as a list of important mitigations to keep ransomware at… 12 minutes
Russia’s war on Ukraine signals shift from traditional cyberattacks to information warfare Read on to learn more about how information warfare is outgunning traditional cyberattacks in the war between Russia and Ukraine,… 8 minutes
Why securing credentials is more important than ever To learn more about the best practices for credential security today, read on below. 7 minutes