Blog
Top 5 Enpass Alternatives for iOS and Android
November 26, 2019
0 Comment
By PARTH SHAH
Enpass password manager has been making waves in the password management solutions. The app is available on every platform and allows the user the flexibility to store the data on any cloud provider. Up until now, Enpass was following a one-time payment option per operating system. That means, you pay
Survey: Multicloud Security Next Big Challenge
November 26, 2019
0 Comment
By Michael Vizard
IT organizations are starting to appreciate the complexity of the cybersecurity challenges they now face as they employ multiple clouds. A global survey of 127 IT and business professionals conducted by the Business Performance Innovation (BPI) Network, an organization of IT professionals. in collaboration with A10 Networks, a provider of
What Phase Of The Cyber Kill Chain Is Your Network In?
November 25, 2019
0 Comment
By Samu Konttinen
It was like a CEO’s nightmare come to life. In March 2019, Norsk Hydro, a Norwegian aluminum company, suffered a ransomware attack that, shudderingly, “affected our entire global organization,” including 160 plants, according to CEO Svein Richard Brandtzæg. For Norsk, like any manufacturer, product must ship or the business will
2020 Cyber Insurance Predictions
November 25, 2019
0 Comment
By Yakir Golan
In the past few years, I’ve watched insurers and reinsurers delicately maneuver around cyber insurance. Lucrative loss ratios have brought many new players into the market. I’ve spent the majority of my career surrounded by cyber, artificial intelligence and risk management. My experience led me to discover an interesting gap
Cybersecurity a Bore? Not When You Get Hacked
November 25, 2019
0 Comment
By Dan Skiles
Cybersecurity is by far the most popular topic when I’m speaking with advisors. And rightfully so. Most conversations revolve around important action steps and “what are you hearing?” type questions for best protecting an advisory firm. Unfortunately, fraudsters continue to evolve their attack strategies, and “social engineering” attacks, also called