Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

Webinar Recap: Protect Your Remote Workers Endpoints

Webinar Recap: Protect Your Remote Workers Endpoints

Webinar Recap: Protect Your Remote Workers Endpoints We held a webinar on ways you can protect your workers' devices using Endpoint Detection & Response (EDR) software combined with Managed Security Services (MSS). The webinar was held in conjunction with FireEye....

Domain Protection Against Typo Squatting

Domain Protection Against Typo Squatting

Domain Protection Against Typo Squatting Malicious domains are established daily that mimic legitimate companies. This practice is known as typo squatting or URL hijacking. The domains are used by threat actors to impersonate and deliver cyber attacks to companies and...

Cipher Podcast: Exploring the Cybersecurity Prevention Bias

Cipher Podcast: Exploring the Cybersecurity Prevention Bias

Cipher Podcast: Exploring the Cybersecurity Prevention Bias Cipher's Peter Hackett and David Rickard discussed the prevention bias for cybersecurity. Prevention is stopping something from happening. Bias is partiality for a perspective based on beliefs or feelings...

Get 20/20 Cybersecurity Vision Onto Your Endpoints

Get 20/20 Cybersecurity Vision Onto Your Endpoints

Get 20/20 Cybersecurity Vision Onto Your Endpoints Many organizations lack the ability to monitor endpoints effectively. According to a Ponemon study, only 36% of the companies they surveyed had an Endpoint Detection & Response (EDR) tool. Companies might be using...

Cipher Podcast: Enable Cloud Security with CipherBox

Cipher Podcast: Enable Cloud Security with CipherBox

Cipher Podcast: Enable Cloud Security with CipherBox Cipher's Scott Croskey and Peter Hackett discussed Cloud cybersecurity. With new ways of working, come additional risks. This podcast covered common risks and how to mitigate them.   [buzzsprout...

Zoom-Bombing, VTC Hijacking and Privacy

Zoom-Bombing, VTC Hijacking and Privacy

Zoom-Bombing, VTC Hijacking and Privacy Social Distancing guidelines brought about as a result of the Coronavirus (COVID-19) has led to a boom in Video Teleconferencing (VTC) usage. Faced with the isolation from family, friends, classmates and teachers, millions are...

Cipher Podcast: Cybersecurity and Coronavirus (COVID-19)

Cipher Podcast: Cybersecurity and Coronavirus (COVID-19)

Cipher Podcast: Cybersecurity and Coronavirus (COVID-19) Cipher's Scott Croskey and Peter Hackett teamed up to record a podcast discussing the items companies should consider during this time of uncertainty. Listen to their discussion below:   [buzzsprout...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.