Featured Blog
The Cybersecurity Information Sharing Act Has Lapsed—Here’s How to Adapt & Stay Ahead of Attackers
When the Cybersecurity Information Sharing Act quietly expired on September 30—right as Cybersecurity Awareness Month began—it impacted cyber threat intelligence for everyone. “The spigot of information has turned off at a terrible, terrible time,” shared Sherri Davidoff, founder of LMG Security. “The loss of threat intelligence sharing between the government and the private sector will […]
Multifactor Authentication, Social Engineering
Hackers Are Targeting Your Salesforce: What You Need to Know
Insider Threats
Can Your Hiring Process Catch a Deepfake Employee? A Cybersecurity Insider Threat Checklist
Cyberattacks, Insider Threats
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies — and How to Stop Them
Cyberattacks, Cybersecurity
Navigating Today’s Retail Cybersecurity Challenges: Protecting Operations and Customer Data
Cyberattacks, Cybersecurity
Cyberattacks Don’t Take Holidays: Why Hackers Love Long Weekends and How to Prepare
Cybersecurity, Cybersecurity leadership, Cybersecurity Planning