Phishing attacks—where hackers try to collect personal information using deceptive emails and links—continue to impact organizations of all sizes.

It’s been well documented that phishing as an attack vector has exploded over the past several years. SlashNext reported that over the first six months of 2022, there were over 255M attacks, a 61% increase in the rate of phishing attacks compared to 2021.

Read More About
Understanding the Business Costs of Phishing Attacks

Cisco Systems Inc. held its annual Partner Summit this week in Las Vegas, bringing together thousands of global partners to exchange ideas and learn about the networking giant’s most recent innovations. Cisco has one of the largest and most diverse partner ecosystems in the information technology industry, with about 90% of the company’s revenue flowing through its partners from more than 150 countries.

Read More About
Cisco Partner Summit 2022 kicks off the Age of the Partner

The term XDR, for extended detection and response, has been bandied about for almost half a decade. I believe I was the first analyst to use it when I authored this post in 2018. When I wrote the post, I had a very specific definition in mind, but like most things in tech, once a term starts to gain traction, more and more vendors bend the definition to meet their needs.

Read More About
What’s XDR? Five answers to key questions about extended detection and response

The concept of DevSecOps is simple: By integrating security into the DevOps process, businesses introduce security earlier in the software development lifecycle, enabling cyber protection to “shift left,” reducing risks and eliminating costly rework.

Read More About
Zscaler integration with Hashicorp enables DevSecOps to automate security posture

Over the past couple of years there has been a significant focus on phishing, ransomware and other threats that attack online users. While this focus is certainly prudent given the rise in those types of activities, it’s important to not take your eye off more “traditional” type attacks, such as distributed denial of service (DDoS).

Read More About
Report: Cybercriminals Use Cloud for DDoS Attacks