Indicators of Behaviour and the Diminishing Value of IOCs

How secure is your organisation if you can only stop attacks that have already been detected in other environments based on Indicators of Compromise (IOCs)? Secure enough, if those were the only attacks you needed to be concerned with. By Cybereason Sales Director for...

The ultimate security pincer movement

Cybersecurity is a battlefield. An alarming one. According to the Allianz Risk Barometer, the risk of a cybersecurity breach ranks higher than supply chain disruption, a natural disaster and even the Covid-19 pandemic. This is a reasonable concern, after all, 93% of...

How to spot a crypto scam

Since the emergence of Bitcoin in 2009, cryptocurrency has gained significant traction in popularity over the years, with more and more people investing in the now many variations of digital currencies available such as Ethereum, Tether, Binance, and even Dogecoin. By...

Data management at the core of ransomware readiness

Ransomware is one of the biggest threats and challenges facing organisations today. A simple online search will reveal hundreds of high-profile attacks and scary statistics around the acceleration of ransomware incidents and the costs involved. By Kate Mollett,...

Is the public cloud secure?

Is the public cloud safe? Organisations often have this concern as they engage services from third-party cloud hosts. They may have a point – the public cloud is not necessarily as secure as we want to think. The rise in cyberattacks partially correlates with...