Written by John Fokker, Ernesto Fernández Provecho & Bevan Read at the Trellix Advanced Research Center
Big Tech is all in for bug bounty programs while global cyberattacks are increasing. While we can’t control the number of hackers or their intent to...
In business, impermanence is the only certainty. An example is how organizations addressed the COVID-19 pandemic. Within a few weeks, many developed a plan to run...
According to a survey by Statista, typically, global enterprises dedicate a minimum of 12% of their IT expenditure to information security measures. While larger companies can...
Written by Lev Matveev, SearchInform Founder and Chairman of the Board of Directors 75% of information security experts consider insider threats more dangerous than hacker attacks....
Written by Bashar Bashaireh, Managing Director, Middle East & Turkey, Cloudflare Email is the most exploited business application. It is the primary initial attack vector for...
Written by Mark Jow, EMEA Technical Evangelist, Gigamon With the rapid growth of the hybrid cloud market, businesses are experiencing numerous benefits. According to a study...
Written by Dr. Renée Burton, Sr Director of Threat Intelligence for Infoblox Over the last several years, the adoption of multi-factor authentication (MFA) has gained momentum....
Lev Matveev, founder and chairman of SearchInform, reveals the main “pain points” in the information security protection of small and medium-sized businesses, explains, how to eliminate...
In the modern digital era, cybercriminals are constantly evolving, using advanced methods to exploit weak points and trick the unsuspecting. Phishing attacks, where attackers impersonate trusted...