November 2022 Blog

November 2022 Blog

November 2022 Blog Government and Private Sector Cooperation in Cyberdefense and the Impact on Your Organization As 2022 draws to a close, we are seeing an emerging trend in the cybersecurity industry: the emergence of much more stringent laws and associated penalties...
October 2022 Blog

October 2022 Blog

  Dependency Versus Autonomy – What Are Cybersecurity Solution Vendors Seeking? In this month’s blog, I would like to explore the basic concept of ‘DEPENDENCY’ versus ‘AUTONOMY’ in the application of cybersecurity technology to solving common cybersecurity...
September 2022 Blog

September 2022 Blog

  What Honeybees Can Teach Us About Cybersecurity I would like to quote Gianna Whitver, Bees & Cybersecurity | VP of Marketing, Votiro | Co-Founder, Cybersecurity Marketing Society | Founder, LeaseHoney | Podcast Host for this month’s blog content. I am very...
August 2022 Blog

August 2022 Blog

The Psychology of Cybersecurity. Cybersecurity is largely driven by psychology. What I mean by this, is that the threat environment is mostly comprised of human interactions and behaviors with a technological component behind it. It is a given that we need and benefit...
July 2022 Blog

July 2022 Blog

Where’s the Beef? Many Endpoint Detection and Response (EDR) companies are very large and well provided with significant advertising budgets and creative staff to generate marketing campaigns that emphasize their Artificial Intelligence (AI), Machine Learning (ML) and...
June 2022 Blog

June 2022 Blog

The Philippines is perhaps the perfect country to launch a business. The country is blessed with a large and growing population with an average age of less than 26 years old and a robust and thriving economy. Over the past many years, it has developed a solid...
Data Breaches and How to Prevent Them

Data Breaches and How to Prevent Them

Data breaches occur when a cyber attacker illegally accesses confidential information. Investing in cybersecurity awareness training and a detection response solution is the best prevention against a data breach.

Cybersecurity Acronym Soup

Cybersecurity Acronym Soup

LinkedIn presents an endless list of concerns and complaints about the ongoing evolution of cybersecurity acronyms. But, to be honest, new acronyms do little to highlight a solution’s function. Take XDR, its function is as clear as mud.