All Security Operations
elgin eclectic society

The strategic approach to adtech monitoring

When exploring how digital advertising affects users on a daily basis, you may wonder what solutions are in place to monitor complex systems in...

traci

What you should know about Ryuk ransomware

Ryuk ransomware was discovered in August of 2018. Since then, over 100 US organizations have been affected. Knowing more about how Ryuk ransomware operates...

Cybersecurity’s role in digital transformation and brand

Digital transformation is crucial whether you lead a small business or an enterprise. But it’s hard to do, expensive, and unfortunately, the odds of...

cybersecurity roundup Q

Selling your genetic information, a Kansas farm turned digital nightmare, and more: Q4 ’19 cybersecurity roundup

We’ve reached our last roundup post of the year (and the decade!). This quarter’s interesting articles included yet another example of tech meant to...

cybersecurity roundup Q

Q3 roundup: 14 interesting articles on cybersecurity news & expert opinions

2019 is flying by fast, and there were many developments in cybersecurity during the third quarter. From the rise of deepfakes and AI to...

How can data theft be prevented?

Corporate data theft is nothing new. In fact, according to a study conducted by McAfee, “ majority of IT professionals have experienced at least one data...

jake

How to streamline your network monitoring workflows with API integrations

In this industry, I’ve seen a common trend of buying best-in-breed solutions that are built for one or a few things instead of the...

annam

How to monitor for a targeted data breach with NetFlow

Estimates show that 1 in 4 organizations will experience data loss of more than ten thousand records within the next twenty-four months. Without the...