Is browser isolation sacrilege or a shrewd choice?
Cybercriminals are exfiltrating data from hacked networks before encrypting it and threatening victims to release it online
Malvertising has triggered the rapid spread of cryptojacking malware in the last few years
While addressing the skills gap looks unrealistic in the short term, the adoption of Zero Trust becomes the smart play
The University of Utah paid $457K to prevent hackers from leaking the data, even if they had restored the data from backups
Companies need to start the RBI journey somewhere and the VAP coverage is a step taken in the right direction
Avoiding Garmin-like collateral damage caused by a ransomware attack requires you to embrace Zero Trust
The Twitter hack points out the growing social engineering attacks and insider threats