When Your CEO Isn't Your CEO: 4 Ways to Help Avoid the Scam

July 07, 2016 | Dan Kaplan

Business executives have long served as optimal marks for digital con artists. ...

How to Better Secure the Endpoint: 5 Elements of a Successful Strategy

June 23, 2016 | Dan Kaplan

Endpoints are everywhere and, at the same time, nowhere. Whether it is a laptop ...

How to Stay on Top of the EU General Data Protection Regulation

June 08, 2016 | Jane Dotsenko

New data protection rules in the European Union have now been published after ...

9 Powerful Ways to Help Prepare for a Data Breach

May 10, 2016 | Dan Kaplan

Do you ever have that dream where you're back in college and you've somehow ...

5 Highly Effective Ways for Law Firms to Protect Client Data

March 30, 2016 | Jane Dotsenko

Cybercrime is evolving rapidly and targeting all types of businesses. Where ...

What to Do About Social Engineering and POS attacks in the Hotel Industry

March 21, 2016 | Jane Dotsenko

Think about your average hotel lobby on a busy day. Likely there will be ...

Why Cybersecurity in the Hotel Industry Should be a Joint Effort

February 10, 2016 | Jane Dotsenko

Recent cybercrime headlines in the hospitality industry should make for ...

How to Stay One Step Ahead of Retail Hackers

January 20, 2016 | Jane Dotsenko

They are glorified in Hollywood as unbeatable masterminds, and ubiquitous in ...

Our Top 10 Most Read Blog Posts of 2015

December 31, 2015 | Dan Kaplan

The security landscape has so much to give in terms of subject matter that is ...

A 3-Step Security Action Plan for Financial Firms

December 21, 2015 | Jane Dotsenko

The finance sector is a prime target for cybercrime and appears fourth in the ...

7 Fundamental Ways to Repel Ransomware

December 11, 2015 | Dan Kaplan

Let's put aside for a moment the mega data breaches that resulted in millions ...

3 Easy Steps for Foiling Social Engineering Attacks

October 22, 2015 | Ismail Saifudin

Not too long ago, one of my fellow penetration testing consultants at Trustwave ...

10 Resources to Turbocharge Your Security Awareness

October 20, 2015

It's National Cyber Security Awareness Month - a perfect time to emphasize the ...

9 Ways to Create a Security Awareness Program People Won’t Hate

October 07, 2015 | Dan Kaplan

It's become one of the great debates within information security: Do ...

Why Mobile Security Has Become Something Huge

September 10, 2015 | Dan Kaplan

Mobility is no longer something tangible that takes the form of a phone or ...

How to Secure Your Internet of Things

August 20, 2015 | Dan Kaplan

You didn't have to attend this month's Black Hat and DefCon shows in Las Vegas ...

9 Productivity Tricks for the Time-Crunched Security Professional

June 25, 2015 | Dan Kaplan

Security professionals are a busy bunch. Thanks to sophisticated threats, ...

7 Pro Tips for Bulking up Password Security

May 21, 2015 | Dan Kaplan

In an era of advanced security controls, passwords are among the most primitive ...

Now Open: Security Stats Hub for Infosec Pros

May 18, 2015 | Dan Kaplan

Not too long ago, the security leader of a given organization - if the role ...

5 Highly Effective Habits of Security-Minded CEOs

April 30, 2015 | Dan Kaplan

More than ever, CEOs and other corporate executives are keeping a close watch ...

5 Insiders Who Can Break Your Security

March 26, 2015 | Dan Kaplan

Threats conceived and orchestrated by external adversaries typically draw most ...

5 Qualities to Look for in an MSSP

December 01, 2014 | Dan Kaplan

Independent research firm Forrester Research has published a new report that ...

5 Security Tips for Using Third-Party Applications

August 20, 2014 | Dan Kaplan

As operating systems become more resistant to attack - mostly due to better ...

5 Steps for Financial Firms to Get Ahead of the Attackers

August 13, 2014 | Dan Kaplan

Long considered an information security stalwart compared to other industries, ...

Need Someone to Root Against During the World Cup? Try Malware Pushers

June 12, 2014 | Abby Ross

World Cup 2014 kicks off Thursday and, like most major sports events, employees ...

How Law Firms Can Help Ensure Data Security Amid Growing Client Concerns

May 06, 2014 | Dan Kaplan

When one thinks of enticing and lucrative hacker targets, law firms likely ...

4 Ways to Ensure the Next Application You Roll Out is Security Ready

April 17, 2014 | Dan Kaplan

One of the most fascinating and widely covered findings from our recently ...

Two million stolen passwords: How to protect yourself

January 02, 2014 | Dan Kaplan