editor’s picks

  • Trends

Continuous Compromise Assessment™ is Championing the NAV Market

Reading Time: 2 minsAnalyst firm Frost & Sullivan assesses how major players in the NAV market are addressing organizations’ biggest…

3 years ago
  • Attacks

Recognize the First Signs of a Ransomware Chain

Reading Time: 5 minsRansomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains and…

3 years ago
  • Technical

MSP Spotlight: Help SMBs Build Cybersecurity Resilience

Reading Time: 3 minsMSPs' skills and resources make them perfectly positioned to fulfill SMBs’ need for increased cybersecurity resilience.

3 years ago
  • Attacks

Monetization of Cybercrime: It’s All About the Money

Reading Time: 2 minsThe monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's why…

3 years ago
  • Culture

Why I’m Taking Off With Lumu

Reading Time: 2 minsLuis Quiñones has joined Lumu Technologies after more than a decade in various roles at Cisco North…

3 years ago
  • Interviews

Flash Talk: Greg Touhill on the State of Cybersecurity

Reading Time: 4 minsThe State of Cybersecurity in 2021: Americas’ first federal CISO talks us in the wake of yet…

3 years ago
  • Interviews

In the Spotlight: SMB Cybersecurity Challenges

Reading Time: 5 minsAs Director of Engineering and Security at Upward Technologies, Elias Stucky works to solve small and medium-sized…

3 years ago
  • Technical

Is Your SIEM a Bad Habit?

Reading Time: 4 minsVeteran Cybersecurity Operator at Lumu Andrés Argüelles looks at using Lumu with your SIEM to get the…

3 years ago
  • Technical

Lumu Defender: Automating Threat Defense

Reading Time: 3 minsLumu Defender lets you feed Lumu's confirmed compromise instances into your existing cybersecurity stack for an automated…

3 years ago
  • Trends

They Call It XDR. We Call It Continuous Compromise Assessment.

Reading Time: 4 minsXDR is the latest acronym to be buzzing around the cybersecurity industry. But does it solve the…

4 years ago
  • Interviews

In the Spotlight: 7 Habits of Highly Effective Cybersecurity Operators

Reading Time: 6 minsIn a talk presented in conjunction with the SANS Institute, cybersecurity experts Evgeniy and Jorge discuss the…

4 years ago
  • Trends

White House Ransomware Open Letter: 5 Takeaways

Reading Time: 3 minsA White House ransomware open letter urges business leaders to act on cybercrime. Here are some immediate…

4 years ago
  • Stories

CISO’s 2021 Cybersecurity Priorities

Reading Time: 2 minsA CISO’s list of responsibilities never gets any shorter, so we asked them about their most urgent…

4 years ago