background.png

The Cyber Feed

Next Gen Managed Detection and Response Starts Here.

Recent Posts

Posts by Topic

see all

Get Updates from Us!

Capital One is not the only company targeted with data breach – says CyberInt Research

It is estimated that data breaches will cost over $150 million by 2020 , with North America leading top targeted countries we again faced a massive data breach last week with Capital One stating over ...

Read More

Responses To 2018 Data Breaches- The Good, The Bad and The Ugly

When a breach happens - how you handle it can make all the difference.

Read More

More Important Than Ever: Taking on Your Online Brand Protection

If it’s valuable, it needs protecting. Every business, from eCommerce and online retailers to banks, are waking up to the need to protect their sacred brand. But how? Some high profile companies have ...

Read More

AI Based Threat Intelligence vs. AI Based Cybercrime

Artificial intelligence (AI) and machine learning (ML) are the latest buzzwords surrounding general technology trends that have also made their way into cybersecurity.

Read More

Game Over for Hackers: Critical Account Takeover Vulnerability Discovered and Patched in EA Games

Gaming is a massive industry that is worth about $138 billion worldwide. Trade in digital in-game items alone will generate $50 billion in worldwide consumer spending by 2022. 

Read More

How to Create a Secure Customer Experience Model for Your Business

As consumers are increasingly protective over their security and privacy, gaining their ‘cyber trust’ is becoming critical to the customer experience. Online transactions often require consumers to ...

Read More

Social Media: A Heaven For Cyber Criminals

Updated as of June 12, 2019 Social media has become ingrained into many people's lives and is regularly referenced in news reports. According to a research report on social media use in 2018, 74% of ...

Read More

How Threat-Centric Managed Detection & Response Services Can Make You Resilient to Cyber Attacks in 2019

Enterprises that are serious about cybersecurity know the number of attacks and the type of attack vectors are increasing in quantity and complexity.

Read More

Russian Threat Group TA505 is Out Phishing: Hijacks Legitimate Remote Access Tools

Remote access tools are the lifeblood of a distributed enterprise. Unfortunately, the very tools that make businesses in the cloud age tick can be hijacked by threat actors to gain access to valuable ...

Read More

Part 2: Evaluating Your Company’s Cyber Posture

In our previous post, we discussed the key differences between cyber posture and cyber risk management. Cyber posture – a measure of your resilience to cybersecurity threats – is a crucial marker of ...

Read More

SUBSCRIBE

download.jpg