Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Reflecting on KnowBe4's 5th Consecutive TrustRadius Tech Cares Award

For the fifth year in a row, we've been honored with the TrustRadius Tech Cares Award! This recognition is a testament to our unwavering commitment to corporate social responsibility (CSR) and the incredible efforts of our team. What makes this recognition so special is that it celebrates companies that go above and beyond in their CSR programs. At KnowBe4, we've always believed that our responsibility extends far beyond our products and services.

How Attackers Use APIs to Disguise Bots as Games Consoles

Attackers and bot authors are continually evolving their methods, shifting their focus beyond just websites. With websites often having a reasonable level of protection, malicious actors are increasingly targeting less-protected areas, namely APIs, with their bots. This blog post delves into the evolving threat landscape. We’ll focus on how attackers exploit APIs and IoT devices to launch attacks like credential stuffing, using streaming services as a prime example.

Top Reasons to Invest in Aluminum Gates

When it comes to securing your home while maintaining an attractive exterior, aluminum gates are an exceptional choice. Whether you have a modern or traditional home, aluminum fences provide the perfect balance between security and aesthetic appeal. At Aluglobus Fence, we specialize in crafting custom aluminum gates that offer both style and durability, ensuring your home remains safe and welcoming.

Thwarting Cyberattacks: Top In-House Solutions

There is no doubt that the number (and severity) of cyberattacks is on the rise. While the lion's share of attention has been devoted to major breaches that often impact multinational organisations, the fact of the matter is that small- to medium-sized enterprises are also at risk. This is why managers and stakeholders must adopt the latest safety protocols to avoid incidents that might otherwise quickly bring operations to a halt. Let us look at four practical suggestions, and the unique benefits associated with each.

How to Securely Use AI in Your Business

Since ChatGPT's launch in November 2022, generative AI-based services have flooded nearly every single sector. While these tools have the potential to greatly increase work productivity, they also introduce risk that organizations may not be aware of. Some companies have taken the hardline approach of banning employee access to AI tools, but following that path runs the risk of leaving you lagging behind your competition.

Email Security for Financial Institutions: Mitigating Risks and Ensuring Compliance

You no longer need to pull off a bank heist to pocket millions of dollars. Taking advantage of an email breach is easier for attackers and allows them to use your infrastructure’s weaknesses to demand ransom, steal personal information, or perform other fraudulent activities.

What is a Cyber Advisor?

Certifications are a great way for customers to get confidence that the company they’re trusting with their cyber security is up to the job. So, when the Cyber Advisor scheme was launched, we thought it was a great opportunity to invest in our staff. In this Q&A blog we’ll look at what a Cyber Advisor is, what it means for your business, and what it means to our staff – as we talk to Bulletproof’s first Cyber Advisor, Jemma Aldridge.

Key Aspects of a Successful Remediation Plan | Seemplicity

Kevin Swan, Senior Product Marketing Manager at Seemplicity, dives deep into the essential components of a successful remediation plan. Learn how to transform vulnerability management chaos into scalable remediation plans by focusing on four critical areas: identifying what needs to be remediated, locating vulnerable assets, assigning responsible teams, and implementing effective remediation strategies.

Old habits, new threats: Why more phishing attacks are bypassing outdated perimeter detection

Perimeter solutions such as Secure Email Gateways (SEGs) have long been a cornerstone of email security, historically serving as the primary line of defense against malicious emails entering an organization. Utilizing legacy technology such as signature and reputation-based detection, SEGs have provided pre-delivery intervention by quarantining malicious attacks before they reach the end recipient. Why, then, are 91% of cybersecurity leaders frustrated with their SEGs, and 87% considering a replacement?