Within hours of the Log4j vulnerability (CVE-2021-44228) being published, Ericom's ZTEdge platform had an automatic security update applied to protect our customers.
In this second post covering the 2021 IOCTA report, we discuss the increasing use of cloud-based “crime as a service” platforms and the convergence between plain old criminals and the cyber variety.
The new IOCTA report describe how today’s cybercriminals have adopted increasingly strategic approaches to who they attack and how they do it – and are securing larger payouts as a result.
HTML smuggling attacks are on the rise and unfortunately are able to evade traditional cyber defenses. Learn what these attacks are, and what you can do about them
Instant Messengers like WhatsApp are widely used to communicate with business associates as well as friends and family. But IM web clients can pose a real danger to network security.
Costs are rising, but there's good news, too. Breaches of companies that had Zero Trust deployed were less frequent and cost 35% less than for companies that did not deploy Zero Trust
The best way for midsize enterprises to defend their distributed businesses against today’s cyber threats is to adopt a cloud-based Zero Trust security approach that protects them no matter where users or resources are located.
Detection-based cybersecurity approaches lock organizations in to frustrating, unending and costly “cat and mouse” games with clever cybercriminals. Break the cycle with Zero Trust defenses that strengthen protection to keep even unknown threats out.
In his recent podcast, David discussed the record numbers of phishing and ransomware attacks over the past year, and how businesses can better protect users and networks.