In Security, What We Don’t See Can Hurt Us

As unfortunate, sad, and tragic as traffic accidents are, they regularly have one thing in common.  When one of the people involved in the accident is asked how the accident happened, the response is often, “I just didn’t see the other driver coming.”  The fact that this is such a familiar response is not surprising. […]

Read More…

Preventing Business Email Compromise Requires a Human Touch

Human-powered Intelligence Plays a Critical Role in Defending Against Socially Engineered Attacks The FBI’s Internet Crime Complaint Center (IC3) declared Business Email Compromise (BEC) the “3.1 billion dollar scam” in 2016, an amount which then grew in the span of one year into a “5 billion dollar scam.” Trend Micro now projects those losses in […]

Read More…

Security Performance in the Cloud: Not All Solutions Are Created Equal

An assumption made by many security professionals is that any performance differences between physical security devices are eliminated when those security software images are run on identical cloud hardware. But the truth is, there are still significant performance differences between solutions, and those differences can be critical both from a processing perspective as well as […]

Read More…