Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Articles by

Rob Sobers

The Likelihood of a Cyber Attack Compared

While the cost of a cyber attack is often discussed, we seldom hear about just how common these attacks actually are. Numerous security experts believe that a cyber attack or...

Read More

12 TED Talks That Will Change the Way You Look at Business Cybersecurity

The cybersecurity landscape is constantly evolving. New security threats pop up daily, and threat actors can be an employee in the next cubicle or a blackhat hacker in a coffee...

Read More

The World’s Most Creative Data Centers: Infographic

Data centers are facilities used to house computer systems and associated components. They are vital to the daily operations of a network and are home to it’s most pivotal systems...

Read More

The Top Skills of Fortune 100 CISOs

The role of CISO is constantly expanding and evolving with the growing awareness of cyber attacks. As cyber attacks increase in density and sophistication, organizations are beginning to look at...

Read More

How to Turn Cybersecurity Jargon into a Language Everyone in Your Office Can Speak

Explaining how cybersecurity affects an entire organization can be complex. The field is filled with jargon and buzzwords that can hinder understanding for those outside of IT. What’s more, everyone...

Read More

Are These 10 Cybersecurity Myths Putting Your Business at Risk?

Cybersecurity preparedness is one of the major obstacles facing businesses today. Despite the increased focus on making companies cybersafe, there are several common cybersecurity misconceptions that still pervade the business...

Read More

The World in Data Breaches

Data security is one of the largest concerns impacting the world today. The increasing sophistication of cyber attacks coupled with the overall lack of cybersecurity has led to the greatest...

Read More

The Average Reading Level of a Privacy Policy

On May 25th, 2018 the European Union’s General Data Protection Regulation, better known as GDPR, became an enforceable law. The policy was implemented primarily to create greater transparency regarding how...

Read More

What Does it Take to Be an Ethical Hacker?

What do you think of when you hear the term “hacker”? If you immediately envision a mysterious figure out to illegally access and compromise systems with the intent to wreak...

Read More

The Anatomy of a Phishing Email

Have you been hooked by a phishing email? Phishing scams are one of the most common ways hackers gain access to sensitive or confidential information. In fact, according to the...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.