A $100,000 Save Made by Detecting Emotet
The malware known as Emotet is back in action. Now, it’s more malicious than [...]
How Cyber Attacks Impact School Boards
Cyber attacks impact school boards – students, teachers and administrators alike – at an exponential [...]
Tracking Cyber Exposure
Tracking cyber exposure requires detailed investigation to understand how a network has been breached and [...]
Cybersecurity Predictions 2021
CYDEF’s cybersecurity predictions for 2021, including ransomware expectations, cloud-based software risks, and budget impacts on [...]
The ART of Selecting a Managed Detection and Response Company
Tips for selecting a managed detection and response company based on Actionable, Relevant and Timely response criteria. Selecting [...]
Adrozek Silently Alters Search Results in Web Browsers
Adrozek, a drive by download attack, may be impacting your business’s browsers. From desktops to [...]
Data Breaches: The Reality of Cybersecurity
Cyber attacks at SolarWinds and FireEye underline the importance of cyber risk management. Breaches happen. [...]
Risk Management: The Strongest Cybersecurity Tactic
Prevention is Not the (Only) Cure Risk management is the strongest cybersecurity tactic, outweighing the roles of [...]
Defense in Depth as a Cyber Risk Prevention Tactic
On the Relationship Between Cheese and Risk In cybersecurity, there is a lot of [...]
What is SASE?
Secure access, secure edge (SASE) is the hot ticket cybersecurity. Do you understand the benefits? [...]
Why MDR is Mission Critical for SMBs
Managed Detection and Response tools provide SMBs with highly effective cybersecurity in the face of [...]
Cybersecurity Countermeasures: Tools for Risk Management
A discussion of The Law of Diminishing Returns and Cybersecurity Investment. The Cybersecurity Price Quandary [...]