
Can Cybersecurity be Automated?
Cybersecurity is time- and resource-intensive. The threat landscape continues to evolve, and security analysts are feeling burnt out. According to research, 54% of security operation center
Cybersecurity is time- and resource-intensive. The threat landscape continues to evolve, and security analysts are feeling burnt out. According to research, 54% of security operation center
Phishing is one of the most common and effective cybersecurity attack vectors, accounting for roughly a quarter of all ransomware attacks between 2019 and 2021,
In the day and age of COVID-19, we have witnessed a transformation of the way we work. If I were asked before March of 2020
Data breaches are forever becoming more a part of everyday life in the United States. Hardly a day goes by when you can’t watch the
Part of our blog series “How to prevent a WordPress site hack in 2019: lessons from a former hacker” Hello all and welcome to the
Welcome back to the next edition of “Hacking WordPress”. Find Part 1 if you missed it. Let me start with a PSA message. It is
Hello all and welcome to the first episode of the Hacking WordPress series. With this series, I will be putting together a series of videos
Every day, as a part of my work at AlienVault, I talk to prospective clients. Many of them are trying to put together a security
In a post released on 1/8/19, I wrote about the record number of breaches in 2018. This brought to mind a podcast that I was
During the holiday season people logged on to make purchases through online retailers, like no other time of the year. While there was significant growth