Ensuring Business Continuity Amidst COVID19
How to Secure a Mobile Workforce through Crisis The virus that started spreading in the human population of Wuhan in late 2019,... Learn More
LKMethod Provides At Cost Citrix Licensing to Help Organizations with Remote Users
Lydall Kirkes, CEO of LKMethod announced on March 18th that his company will provide "at cost" Citrix Licensing to help struggling organizations give remote media access to their users.
Web Application Firewall, is it enough?
Web App Firewall and DDoS Protection: Why You Need Both? Adopting a “layered approach” is the new norm in the world of cybersecurity.... Learn More
The $26 Billion Cybersecurity Scam of 2019
Business Email Compromise: A Rising Threat Labeled as a $26 billion scam by the FBI in 2019, Business Email Compromise, a.k.a. BEC,... Learn More
What’s on the Horizon for Cybersecurity
Third Party Vendors “Top of Mind” for 2020 Organizations have been consistently turning to third-party providers for fulfilling a range of their... Learn More
The Cloud Security Challenge
Misconfigurations and API Vulnerabilities Organizations are rapidly embracing cloud applications that naturally require the transfer of sensitive data to the cloud. However,... Learn More
Cyber Attacks 50% Higher in the First Half of 2019
4.1 Billion Records Compromised Despite the growing cybersecurity awareness, better security budget allocation, and best efforts by business leaders and their cybersecurity... Learn More
Enterprise IoT, More Vulnerable, here’s why
Attack Surfaces on the Rise When it comes to technology, there is a new ‘next big thing’ every decade or so. This... Learn More
Predict User Behavior with A.I. and Machine Learning
Deep Insights and Autonomous Actions Modern security solutions are increasingly becoming proactive rather than reactive. Instead of waiting for an actual trigger,... Learn More
When Social Engineering meets Malware Injection
It’s not uncommon for cybercriminals to use a combination of several techniques to perpetuate their attacks. For instance, using social engineering techniques... Learn More