How to Win Shopper Loyalty and Influence Buying Behavior
We’ve all seen the headlines screaming that the retail apocalypse is here, and retail stores as we know them are in their death throes. Some of the hysteria is warranted. Competition from e-commerce is fierce. A whopping 3,500 stores are expected to shutter their...
DocuSign Data Breach Leads to Massive Phishing Attacks
Xiologix partner KnowBe4 named the new outbreak of DocuSign Phishing Attacks as their “Scam of the Week.” Here is what KnowBe4 founder and CEO Stu Sjouwerman had to say in their latest newsletter posted earlier today, May 22. “DocuSign has admitted they were the...
The Ransomware Scourge – How to Protect Your Business
Unless you’ve been completely off the grid for the past several days, you’re probably aware of the global havoc caused by the outbreak of the “WannaCry” ransomware variant. The initial outbreak was stalled by an “accidental hero” who spotted a very strange,...Spring Cleaning Threat Hunt — What to Weed Out
Now that the weather is warmer, spring fever has many folks tidying up. When it comes to cybersecurity, a bit of spring cleaning is always good practice. It’s the perfect time to hone your threat-hunting skills to weed the bad guys who’ve been lurking in the...Christopher Kusek and Kevin Elder earn Dell EMC Elect Recognition!
Dell EMC Elect is an annual recognition for people who have given back to the community of Dell EMC users by sharing their technical expertise and evangelizing to others about Dell EMC solutions and services. There are only 157 people worldwide with this recognition...
What’s Happening to Citrix Subscription Advantage?
In case you haven’t heard, Citrix is retiring Subscription Advantage, and replacing it with a new suite of support services called “Customer Success Services” (“CSS”). Ultimately, there will be three tiers of CSS available – “Select”, “Priority”, and “Priority Plus” –...
Malware Madness: 5 Trends to Watch
If you’re a college hoops fan, you no doubt agonized over getting your bracket right. And just when you thought you had it all figured out—then, boom—a team like Duke makes an early exit throwing everything into disarray. The latest malware threats are a lot like...4-Point Checklist for Choosing the Right SIEM
Organizations implement security information and event management systems (SIEMs) for a variety of reasons [Read “4 Reasons to Build SIEM into Your Security Platform”], from protecting data against increasingly sophisticated threats to improving compliance in complex...4 Reasons to Build SIEM into Your Security Platform
Are you constantly chasing down the latest threats, struggling to comply with ever-evolving regulatory compliance initiatives and fighting just to just gain an accurate picture of the data running across your network? Perhaps it’s time you considered adding a security...Byline: Securing Your Growing Home Network
As our work and social networks expand into the home, and the potential threat footprint in our homes continues to grow, it is critical that we take a fresh look at how we are protecting ourselves from the growing number of networks we interact with. Our personal,...