Fight a Successful Phish

Phishing is one of the most common cyber crimes, but phishing methods have evolved far beyond suspicious emails with offers that are too good to be true. And while employee education is a crucial part of combatting phishing attempts, the sophistication of these attacks means bad actors are still getting through your protections and into your network. From triple extortion to AI-powered attacks, read about the latest phishing methods and how to identify signs of compromise below.

Tell us what you think by joining the #BeCyberSmart conversation on Twitter and LinkedIn.

What is the difference between threat intelligence and cybersecurity?

Threat intelligence is defined as the continuous activity of gathering, processing, analyzing, and distributing information related to threats that target applications and systems. Cybersecurity differs from threat intelligence in that instead of monitoring the threats, it actively combats attacks. 

Security and Threat Intelligence

Abstract dark globe with teal and blue lines and dots

Are You Prepared for AI Malware?

The concept of using artificial intelligence (AI) in cybersecurity is not new. Indeed, many organizations use AI as part of an in-depth security protocol. The trouble is, hackers now have easy access to the same sophisticated techniques that enterprises do, and they are nothing if not motivated.

Read the blog

Cityscape colored in a blue and yellow overlay with white node lines and orange IoT icons

Healthcare Sector: An Enticing Target for Cyberattackers

The digital transformation that has happened in the healthcare industry over the last 10 years has been nothing short of remarkable. However, with this new digital world comes complexity and risk, leaving healthcare providers in an alarming position to cope with a new set of challenges.

Read the blog

Healthcare worker in scrubs and face mask reviewing medical equipment screens

Triple-Extortion Tactics on the Rise for Ransomware Gangs

The latest involves integrating attacks into a ransomware-as-a-service (RaaS) portfolio to create the so-called triple cyberextortion attack. It’s a little bit ransom, a little bit DDoS extortion, and a lot of trouble. 

Read the blog

Computer keyboard in dark red with enter key as the word Ransomware in white

Cybersecurity After the Pandemic

This paper highlights top cybersecurity events and trends during the pandemic and how the lessons learned will influence post-pandemic service assurance and cybersecurity strategies.

Get the white paper

Abstract blue lines and grids on black background

More questions? We have answers!