Spring-cleaning checklist for defending against ransomware
Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...
Evolution of cybersecurity: The rise of XDR in the 2020s
As part of our 5-part series on the evolution of cybersecurity, the fifth and final entry highlights the need for manageability and visibility as the frequency of cyberattacks increased sharply, coupled with a shortage of cybersecurity professionals, and the growth...
Beyond the horizon: Growth of cyberattacks in the 2010s
As part of our 5-part series on the evolution of cybersecurity, check out our fourth article below that covers IoT devices and vulnerabilities to Bitcoin-driven ransomware in the 2010s. During the 2000s, we saw the growing arms race between security...
Essential tips and strategies for protecting against ransomware
In September, MGM Resorts faced system outages (affecting hotel room keycard systems and slot machines) and service disruptions at its Las Vegas properties. Caesars Entertainment also reported suffering a data breach that revealed its loyalty program members’ Social Security and driver’s license...
The dawn of real-time defense: security transformation in the 2000s
As part of our 5-part series on the evolution of cybersecurity, check out our third article below that covers how the beginning of the 21st century witnessed a relentless battle between cybercriminals and security experts, fueled by the rapid evolution of...
Guarding the Gates: The rise of network protection in the 1990s
As part of our 5-part series on the evolution of cybersecurity, check out our second article below that covers how the security industry laid the groundwork for a more holistic approach to cybersecurity. We are continuing our series that explores...
From Basics to Breakthroughs: Evolution of IT security in the 1980s
As part of our 5-part series on the evolution of cybersecurity, check out our first article below that covers how War Games and Worms led to the creation of the first cybersecurity efforts in the 1980s. While cybersecurity is a multibillion-dollar...
Bend, don’t break: How attackers and defenders learn from each other
For more than 30 years, cyber attackers and security teams have battled it out across the digital landscape, one side looking for gaps and flaws to target, the other side fixing and protecting them. The pace of the conflict is...