Articles
Your Email Security Toolbox: Defense in Depth
While email remains the #1 threat vector, the tools attackers use continues to evolve — we’re no longer dealing with annoying emails sent by amateurs. Instead, well-funded and persistent organized crime and nation states create vast email schemes. At the heart of these attacks? Massive amount…
Don’t Feed the Phish: Implementing DMARC
The Challenge of implementing SPF and DKIM It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not been widely adopted. However, organizations must take advantage of them to tackle two of the most pressing email securi…
Why phishing attacks still win and what you can do about it, Part I
In the last few years we have seen a fundamental shift in malicious tactics leveraging social engineering techniques. Among the most effective of these are phishing attacks, where cybercriminals exploit a brand’s reputation to evade email security defenses and convince individuals to open an email a…
The IoT(s): One Size Does Not Fit All
Today let’s talk about IoT as a plurality. I suspect that you may have recently heard the phrase that “words matter,” and when talking about something as broad and diverse as “IoT” it really does indeed matter. It matters because correctly defining what you are speaking about, and to whom, will help…
Welcome to the OT World
It may have come to you in an email or perhaps during a 1:1 with your boss but either way the news probably caught you by surprise. You will be taking your security skills to the industrial side of the house. Congratulations! And good luck – you are going to need it. Much of what you have learned an…
Trends in Data Center Security: Part 1 – Traffic Trends
Organizations are quickly discovering that a “one size fits all” approach to security across the network falls short of addressing the unique trends in the Data Center. So what’s really that unique about the Data Center (DC)? This is a multi-part blog to highlight various trends related to securing…