The Most Dangerous Cloud Attack Methods In The Wild Today Source: SentinelOne.com The cybersecurity threat landscape is vast, and we are often faced with the challenge of keeping in touch with novel attack techniques and new attack surfaces. As enterprises continue to...
5 Ways the Cloud Enables Business Communication Source: Intermedia.com Now that the cloud has become a mainstay in the business world, we’re starting to see the true impact of cloud business communications. Most companies use the cloud — 91 percent use the public...
SysJoker and DazzleSpy Malware Target macOS Source: SentinelOne.com As last year closed out, we provided a round up of the previous 12 months of Mac malware, making the observation that, among other things, 2021’s macOS malware cohort saw a focus on spyware and the...
8 Features You Need for High-Level Webinar Presentations Source: Intermedia.com Webinars are a powerful medium for presenting education, product demonstrations, thought leadership, and more. They can be highly effective and translate into sales opportunities. When...
Our Cybersecurity Predictions for 2022: What’s Next Source: SentinelOne.com 22021 was a year in which everything escalated. The pandemic triggered more separation, more isolation, and a general unease in our ability to discern the good from the bad. In...