FILTER BY:
Use Cases
  • Option1
  • Option2
  • Option3
Products
  • Option1
  • Option2
  • Option3
Industries
  • Option1
  • Option2
  • Option3
Sort by
  • Ascending
  • Descending
List-icon List-icon
blog-icon
Blog
By April 11, 2019 3 MIN READ

81% of CIOs and CISOs Defer Critical Updates or Patches

New research indicates that eight out of ten CIOs and CISOs refrain from adopting an important security update or patch, due to concerns about the impact it might have on business operations. More…

blog-icon
Blog
By John K. Klassen March 22, 2019 3 MIN READ

FiServ: Minimize Vendor Risk Online in One Quick Step

Here’s a quick tip for CISOs and compliance officers in banks, credit unions, investment advisors, and wealth management firms who worry about cybersecurity threats that emanate from vendors and…

blog-icon
Blog
By A8 Team March 15, 2019 4 MIN READ

VPN: A Big Misunderstanding?

Most VPN services fail to provide a level of data protection and anonymity that would pass professional-level muster. Part 3 of our VPN miniseries shows how confusion about this 20+ years old…

blog-icon
Blog
By Amir Khashayar Mohammadi March 08, 2019 5 MIN READ

How Watering Hole Attacks Target the Financial Sector and Governments

Websites of governments, regulatory bodies and financial authorities are preferred targets for "watering hole" attacks on finance, investment and compliance professionals. These online resources make…

blog-icon
Blog
By February 28, 2019 2 MIN READ

VPN for Secure and Private Web Access? Think Again.

Many believe a VPN will protect users against online privacy violations and web-borne exploits. But how far can you really trust VPN? Many believe a Virtual Private Network (VPN) will protect users…

blog-icon
Blog
By Amir Khashayar Mohammadi February 21, 2019 5 MIN READ

VPN and privacy: what nobody told you

Did you know that ISPs can use VPN to spy on you? Third parties taking advantage of your VPN’s many flaws for nefarious purposes. We explain how they do it.  

blog-icon
Blog
By John K. Klassen February 12, 2019 3 MIN READ

Financial Services: Blindspot Browser

For regulated investment firms, the SEC’s Office of Compliance Inspections and Examinations (OCIE) has prioritized“cybersecurity with an emphasis on, among other things, governance and risk…

blog-icon
Blog
By Amir Khashayar Mohammadi February 07, 2019 6 MIN READ

Quick Dissections: Collections 2-5

The Collection #1 loot archive of stolen credentials is only the tip of the archive. All 5 collections contain more than 1TB of raw credential data awaiting download by attackers.

blog-icon
Blog
By Justin Cleveland January 29, 2019 4 MIN READ

Why Your Defender’s Paradigm Isn’t Working Anymore

Why does it seem like despite the ever-evolving technology and the billions of dollars being spent on cybersecurity, that the attackers are winning? Well, in two words: they are. Despite our best…

Close
Close