Home > Threat Center

Executive POV

Featured resource

Ransomware has a new driver: zero-day exploits

Read on to find out how ransomware gangs are using zero-days, and what your organization can do to stop them.

Read article >

How to protect against Living Off the Land attacks

Read on to learn more about LOTL attacks, including the most commonly-abused tools, how to detect stealthy LOTL tactics, and what your organization can do to protect against them.

Read article >

Ransomware reinfections on the rise: why and how to stop them

Read on to learn how to avoid remediation mistakes, prevent multiple cyberattacks, and keep cyber enemy #1 out of your organization’s systems.

Read article >

ChatGPT: Cybersecurity friend or foe?

Read on to learn more about the pros, cons, conversations, and controversies surrounding ChatGPT, including a call to (halt) action from technology leaders.

Read article >

Do cyber regulations actually make K–12 schools safer? — Navigating compliance while securing school and student data

In the article, I highlight recommendations from key security standards, including the most recent state and federal laws passed to help school districts navigate compliance requirements, all while ensuring students, staff, devices, and data are safe.

Read article >

2023 prediction: Security workforce shortage will lead to nationally significant cyberattack

Read on for advice on how to attract and retain diverse security talent, as well as when to turn to managed service providers (MSPs) to protect your business when funds are not there, though threats very much are.

Read article >

Why security awareness is crucial for all employees this CSAM

Read on to learn more about the impact of awareness programs on organizations’ security postures, as well as how to deploy successful security training for every employee.

Read article >

Ransomware on a roll through Q2, poised to sustain summer attacks

Read on for advice about ransom payment protocols, as well as a list of important mitigations to keep ransomware at bay.

Read article >

Russia’s war on Ukraine signals shift from traditional cyberattacks to information warfare 

Read on to learn more about how information warfare is outgunning traditional cyberattacks in the war between Russia and Ukraine, and how a hybrid of physical, cyber, and informational campaigns may be the future of war.

Read article >

Why securing credentials is more important than ever 

To learn more about the best practices for credential security today, read on below.

Read article >

Get started today

Let us take care of your endpoint security. Deploy the solution that delivers superior defense, easiest to use management, and the best value for your security investment.

Get a quote