The following are excerpts from a blog article written by Greta Egan, a security awareness training strategist for…
Filter by Category:
2018 State of the Phish: Phishing Data, Insights, and Advice
We’re excited to announce the release of the 2018 State of the Phish™ Report, an annual research study…
Why Complex Passwords Provide Weak Cyber Security in the Real World
Careless reuse of passwords by individual users is a vulnerability frequently used by hackers to exploit personal data…
Choosing the Right SIEM Solution
Choosing the Right SIEM Solution Since its inception, SIEM (security information and event management) has been something for…
Machine Learning – What Really Matters
History will look back on our time as the beginning of the artificial intelligence revolution. Today, artificial intelligence…