Friday Five: Real-Life Cyber Consequences, New Ransomware Stats, & More
As ransomware operators continue to expand the impact of their malware, CISA is proposing new requirements to help protect sensitive data, while the SEC is coming down on organizations that downplayed a historical breach. Learn all about these stories and more in this week's Friday Five.
Understanding the Zero Trust Security Model to Safeguard Digital Infrastructure
Zero Trust is a cybersecurity model requiring verification of all internal and external access attempts, eliminating trust to prevent breaches. Learn more about what goes into a zero trust security model and zero trust network access (ZTNA) in this blog.
Friday Five: IT Double Agents, CMMC, Hybrid Work Woes, & More
As CMMC's final rule was released this past week, organizations—particularly those with hybrid environments—continue to ward off a variety of sophisticated insider and outsider threats. Get the latest on these stories in this week's Friday Five.
Secure Access Service Edge (SASE): Moving Beyond Traditional IT Architecture
Learn about Secure Access Service Edge (SASE), its components, and how it enhances network security and performance in a cloud-based service in this week's blog.
Friday Five: The Vulnerable Healthcare Industry, Workplace Cyber Threats, & More
Per multiple sources, the healthcare industry is under an increasing number of attacks with no signs of threat actors slowing down. Meanwhile, Microsoft 365 and cloud service vulnerabilities are leaving users prone to attacks. Learn how you can stay safe in this week's Friday Five.
What Is the General Data Protection Regulation (GDPR)?
The General Data Protection Regulation (GDPR) is a regulation enacted by the European Union to protect EU citizens' privacy and personal data. Read this blog to learn more about who's subject to GDPR compliance, data subject rights, and the misconceptions around consent in GDPR compliance.
XDR vs EDR: What You Need to Know
XDR and EDR solutions can help secure your corporate ecosystem from cyber threats, especially with the increasing number of remote workers. Read this blog to learn the differences between the technologies, how they work, and how to choose between the two.
Friday Five: Threat Actors and Law Enforcement Throwing Punches, Vulnerability Concerns, & More
As ransomware gangs and state-sponsored threat actors wage war against international law enforcement, private organizations, U.S. courts and agencies, and the manufacturing industry are urged to reinforce their cybersecurity measures. Learn all you need to know about these emerging threats in this week's Friday Five.
What Is a Secure Web Gateway (SWG)?
A Secure Web Gateway (SWG) filters and blocks malicious internet traffic, preventing it from entering an organization's internal network. Learn more about how SWGs work, why they're important, and how they can help secure organizations in our new blog.
Friday Five: Adjusting Cyber Standards, Supply Chain Threats, & More
As Chinese ATPs and other cybercriminals escalate attacks against U.S. critical infrastructure, changes to cybersecurity standards and practices may be on the way for healthcare organizations and government agencies. Learn all you need to know in this week's Friday Five.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.