The Future of Managed Security Services

Cybersecurity is moving at the speed of light. Threats and technology change on a regular basis. This makes it hard to determine the best course of action. This article explores the future of managed security services to help you decide if outsourcing your 24×7 security operations is right for your...

Changing State of Consumer Privacy

Consumer Privacy Laws With data breaches on the rise, many new data protection regulations have been enacted. The European Union’s (EU) General Data Protection Regulation (GDPR) is the first and most well-known of these. This opened a floodgate of action in the US. Several new or bolstered laws have gone...

Crimeware-as-a-Service Explained

In our field our customers often express disbelief in how brazen cyber criminals can be. As a “sign of the times” entrepreneurial bad actors have started commoditizing their offering in what is called crimeware-as-a-service. This article explores this disturbing trend and its implications. What is Crimeware-as-a-Service? With the introduction of cloud computing...

Hacking Humans: The Social Engineering Threat

One of the most effective methods for breaking through a company’s cyber defenses is social engineering hacking. Let’s take a closer look at this common cybersecurity threat. Public Perception of Social Engineering When most people think of cyberattacks and the social engineering threat, they picture a scene from an action movie in...