Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Accidentally received someone else's confidential email? Here's what to do

In the best case, emailing confidential information to the wrong person can be embarrassing. In the worst case, it can cause a major security incident that puts people at risk, jeopardizes an organization's reputation, and leads to remedial and legal action. If you have sent a confidential email to the wrong person, read our article ‘Accidentally sent a confidential email to the wrong address? Here’s what to do’.

Xalient Named in The Sunday Times Hundred For Second Consecutive Year

30th June 2023 – Secure network transformation specialist Xalient today announced that it was ranked 92nd in The Sunday Times Hundred list thesundaytimes.co.uk/100 for 2023, which recognises Britain’s fastest-growing private companies. This is the second consecutive year that Xalient has appeared in the rankings.

How to Prioritize Risks in the External Attack Surface Effectively

In today’s interconnected world, organizations face numerous threats from external attackers aiming to exploit vulnerabilities in their systems. Understanding how to prioritize risks in the external attack surface is crucial for mitigating potential vulnerabilities and safeguarding sensitive data. In this comprehensive guide, we will delve into the key considerations and best practices to help you effectively prioritize and manage risks in your organization’s external attack surface.

Top tips: How to protect your privacy online

You open Instagram and the first post is an ad for a smart refrigerator. What a happy coincidence; you and your partner were just discussing getting one for your new home! After you get over the initial excitement of having experienced such an unlikely event, it slowly dawns on you that there’s more at play than coincidence. In the present age, data is akin to gold, and seemingly everyone is trying to get their grubby little hands on yours.

5 security and administrative challenges for hybrid IT organizations

Ever since the adage “identities are the new perimeter” came into being, companies have started to expand their capabilities and operations beyond on-premises, office-based infrastructure. The adoption of cloud-native technologies means that organizations are looking to scale up their conventional workflows without having to invest time and resources on setting up physical data centers and other hardware infrastructure.

The face of 2023's cyber-threat landscape was an alarming surge in ransomware and phishing attacks

When KnowBe4 went public in April 2021, I got to know a select group of analysts that served as co-managers on our IPO. These professionals all know our industry very well and we spoke with them quarterly during our earnings conference call where we discussed the past 3 months and expectations for the future. One of these firms was Baird Equity Research and I am still on their mailing list, even though we went private this year as a Vista Equity Partners portfolio company.

Is Your Smartphone Hacked? Check Out These Signs and Find Out

Did you know that 60% of all cyberattacks originate from mobile devices? Today, our smartphones are almost invaluable to us. They hold everything, from our social media accounts to banking apps, personal photos and videos, and important contacts. However, hackers have also adapted to this reality.

Security SOS: It's dangerous to view cloud and data separately

Security risks within the IT infrastructure of global businesses are increasingly prevalent – and damaging. When swathes of data are separated in the hybrid or multi cloud, it can leave big open doorways for malware to walk right in. The message I want businesses to hear is that cloud and data are not separate. IT only exists to service the needs of a business’ data. Securing cloud services – and therefore your data – is a business-critical issue.

Stories from the SOC: Fighting back against credential harvesting with ProofPoint

Credential harvesting is a technique that hackers use to gain unauthorized access to legitimate credentials using a variety of strategies, tactics, and techniques such as phishing and DNS poisoning. Phishing is the most frequent type of cyber threat and can lead to more harmful attacks such as ransomware and credential harvesting. According to recent research, phishing assaults targeted credential harvesting in 71.5% of cases in 2020.