User Adoption is the Key to Calculating ROI for Security Solutions

The return on investment (ROI) is impossible to calculate for cybersecurity solutions. For such solutions, value isn’t found through dollars saved or deals closed; value is found in unobstructed disaster avoidance and a sense of trust for employees, partners, and customers.

No Longer Only A Fortune 2000 Solution

A cyber-attacker successfully breaks into your environment and begins sneaking around to find something valuable – intellectual property, bank account credentials, company plans, whatever. The attacker makes his way to a certain host on a network node to browse the directories, and suddenly, his connection is cut off. The stolen username and password he acquired…

North Korean Hackers Used ‘Torisma’ Spyware in Job Offers-based Attacks

A cyberespionage campaign aimed at aerospace and defense sectors in order to install data gathering implants on victims’ machines for purposes of surveillance and data exfiltration may have been more sophisticated than previously thought. The attacks, which targeted IP-addresses belonging to internet service providers (ISPs) in Australia, Israel, Russia, and defense contractors based in Russia…

The API-Driven Expansion of Banking

Financial services aren’t just offered by financial services companies anymore. There are a few ways in which banks are expanding their reach by opening their systems to third parties via financial data APIs. The rise of banking as a service (BaaS) has allowed just about any company to expand its offerings to include financial products, but there are a few API-driven ways in which banks are connecting with third parties.