Malicious content easily bypasses gateway, desktop, and email virus scanning solutions to enter directly into Salesforce environments. Here's how to handle it.

Read More

We're pleased to be recognized as a "10 Best Startups to Watch in 2019" by the Silicon Review. Read the full article here.

Read More

This is a great article about integrating cybersecurity solutions to address multiple endpoints, which is exactly why we designed the cloud-based EZProtect antivirus to scan both Salesforce and all connected applications handling attachments (Mulesoft for example) in real-time.

Read More

It is also believed that the “1800ForBail” campaign is part of a large-scale campaign, that aims at exploiting newly found flaws in WordPress.

Read More

The transformative ways in which new technologies – particularly artificial intelligence – are being utilized call for deeper discussions around the ethical considerations of these deployments. Depending on the organization and its level of ambition for implementing these technologies, that might even include the need for a chief ethics officer to ensure these issues receive appropriate attention at high levels of the organization.

Read More

There are numerous factors that play into how well a phish will work. While we know that training and technical controls have varying levels of influence that are often dependent upon organization maturity, implementation of tools, and configuration of tools, what is happening in the world around us is just as important.

Read More

This 4-part article is pivotal in helping you justify security investment to protect your organization in 2019.  I will suggest how you can make your case for the investment you need, as well as the key factors the board will be looking for in your case. 

Read More

Attention Hackers! Demonstrate your ingenuity at the SXSW Hackathon. The sixth annual SXSW Hackathon returns in a buzzy 24-hour marathon stretching from Tuesday, March 12 through Wednesday, March 13! Developers, coders, and tech creatives will collaborate in teams to build tech that addresses the range of media covered at SXSW,  from Music and VR/AR to AI and blockchain. Register here...

Read More
cybersecurity policy

When Democrats take control of the House in January,  they’ll have more power to shape the agenda in Washington. While cybersecurity is not always the flashiest talking point during an election, lawmakers positioning themselves for potential committee chairmanships in the next Congress are planning to dig deep on cybersecurity issues in the new year.

Read More
ransomware

CIOs, CISOs (Chief Information Security Officers), and IT security teams need to heighten their awareness and response plans around the ransomware threat. Cyber defense needs to cross boundaries so that every IT worker understands exactly what ransomware is, how it infects organizations, and how to combat it.

Read More