The recent history of ransomware attacks
The story of ransomware is the story of discovery, professionalization, and growth of the targeted attack extortion model. Before 2016 saw a significant increase...
How to evaluate a managed security service provider (MSSP)
In today’s digitalized world, companies of all types and sizes need to protect their critical data assets against breaches and intrusions. Unfortunately, most don’t...
Benefits of managed security service providers (MSSP)
When delegating information security responsibilities and operations, outsourcing specific managed security services (MSS) through a partnership with a managed security service provider (MSSP) is...
Managed security service provider (MSSP) vs. managed service provider (MSP)
Businesses are increasingly dependent on third-party service providers for mission-critical services. This may include services related to managed IT services, SaaS, finance and accounting,...
What should your cyber insurance policy cover?
Cyber insurance is an emerging class of insurance products designed to mitigate losses from various cyber incidents, including data breaches, business interruptions, and network...
Cyber insurance coverage against ransomware attacks
Complex cyber attacks, including ransomware, make it difficult for victims to respond alone — often requiring specific technical and legal experts, including third-party experts,...
Outsourcing your cyber security – 4 choices for companies
The cyber security posture of your company depends on your choice of efficient security and risk management solutions to defend your IT infrastructure from...
Zero trust architecture: 4 reasons why you need it
The Zero Trust approach to cloud and mobile security holds that no user or application should be trusted by default. The least-privileged access principle,...
QR code security risks – Best practices to mitigate vulnerabilities
QR (quick response) codes are two-dimensional barcodes that can encode various kinds of data. A growing number of fields of application are using QR...
Top open-source vulnerability databases to trace security issues
The Common Vulnerabilities and Exposures (CVE) system is a popular reference system used to catalog disclosed vulnerabilities and exploits.
This dictionary of publicly known cybersecurity...
How to identify suspicious payments associated with ransomware
Due to the crucial role that financial institutions play in obtaining ransom payments, ransomware attacks are a growing concern for the financial sector. Typically,...
How to create an incident response plan
An incident response plan can make the difference between stopping a cyberattack and suffering critical data losses. These attacks rise annually, and organizations must...
















