Brute force attacks are nothing new in cybersecurity. As far back as 2015 (eons ago, in technology terms) the global coffee chain Dunkin' Donuts suffered a brute force attack that... Read More
Blog
What Is Defense in Depth?
"Defense in depth" (DiD) is a cybersecurity strategy inspired by military strategy, providing multiple layers of security controls to protect enterprise IT systems. Each layer of controls can block or... Read More
What is Reputational Risk?
A company's reputation is a delicate thing. With an unfortunate sequence of mistakes or misconduct, years of customer loyalty and public goodwill can evaporate in moments, and some companies never... Read More
Why is Corporate Cybersecurity Important?
Costs associated with cyberattacks are growing rapidly, particularly for businesses. That's not likely to change any time soon. In its 2020 Year End Data Breach QuickView Report, Risk Based Security... Read More
Controls & Risk: Two Sides of the Same Coin
They've attacked hundreds of companies and government agencies leveraging just one software update vulnerability. They've triggered nationwide gas shortages and price surges all from one compromised password. And they've even... Read More