<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Coronavirus Panic, Security, and You

Research

Coronavirus Panic, Security, and You

While it is important to stay vigilant, wash our hands, and maintain social distancing policies, it is also important that we talk about another kind of hygiene, (and I know this sounds corny): our cyber hygiene.

Why We Created Remote Workforce Protection

Insights

Why We Created Remote Workforce Protection

Cybereason Remote Workforce Protection is built to help organizations secure their new, evolving-everywhere office, and to ease the burden on IT and security teams. 

Remote Work is the New Normal

Insights

Remote Work is the New Normal

With more and more employees encouraged to isolate and stay in their homes, a big question on every CEO’s mind is how to ensure her business is able to continue to function when all employees are remote.

Ghost in the Machine: Reconciling AI and Trust in the Connected World

Insights

Ghost in the Machine: Reconciling AI and Trust in the Connected World

This blog is a summary of the research and perspective of Cybereason CSO Sam Curry and Dr. Alon Kaufman of Duality on AI and Privacy titled: Ghost in the Machine, reconciling AI and Trust in the Connected World.

Why is Emotet So Popular and Who is it Targeting Now?

Insights

Why is Emotet So Popular and Who is it Targeting Now?

The malware previously described by DHS as the most destructive ever is surging yet again. Why is Emotet so popular and who is it targeting now?

6 of the Best Malicious Life Cybersecurity History Stories from 2019

Insights

6 of the Best Malicious Life Cybersecurity History Stories from 2019

To close out the year and celebrate seventy episodes of Malicious Life, we’re listing the best cybersecurity podcast episodes we’ve released in 2019.

Is Cyber Retaliation from Iran Imminent?

Insights

Is Cyber Retaliation from Iran Imminent?

We are three days into 2020, and the world is already on high alert. Yesterday evening, the US government killed prominent Maj. Gen. Qasem Soleimani in an overnight airstrike at the Baghdad airport.

Mobile Malware: From Consumer Fraud to Enterprise Espionage

Insights

Mobile Malware: From Consumer Fraud to Enterprise Espionage

The data is telling us that it’s time to secure mobile, and yet our understanding of these threats is severely lacking.

How Geopolitical Events Will Change Cybersecurity in 2020

Cybersecurity

How Geopolitical Events Will Change Cybersecurity in 2020

As we enter the New Year, we need to keep in mind how nation state evolution, new targets, and security vendor stagnation will serve as motivation for hackers.

The Timeline to Consolidation of Endpoint Protection Platforms and EDR

Endpoint Detection and Response

The Timeline to Consolidation of Endpoint Protection Platforms and EDR

The endpoint security market is in the midst of a consolidation of EDR and EPP. How did we get here? Read on to find out.