Agile Blog
The latest in cybersecurity news, topics, and trends
Tackling the Increase in Cloud Complexity and Incidents
Increase in Cloud Complexity In recent years, cloud adoption among organizations has multiplied, and so has the complexity of these cloud services. According to Thales 2022 Cloud Security Report,...
Top September 2022 Cyber-Attacks
It’s the end of September 2022, and the numbers are in– keep reading for the most malicious cyber-attacks over the last thirty days. As reported by Kon Briefing, cyber-attacks have affected more...
A Modern Approach to Defeating Identity-Based Attacks
The past year of cyber crime has been extraordinarily memorable. In Verizon’s most recent Data Breach Investigation Report, they revealed that there were 23,896 security incidents, of which, 5,212...
Cyber Insurance Costs are on the Rise Due to Increase in Cyberattacks
Having written policies and procedures for your IT protocols is the best practice for running a business. However, now more than ever, if a company is looking for cyber insurance, it’s going to be...
Top August 2022 Cyber-Attacks
The numbers for August 2022 are in, folks– you'll want to keep reading this. As reported by Kon Briefing, cyber-attacks have affected more than 25 countries worldwide, with an estimated 58...
Twitter’s History of Cybersecurity Incidents: To Tweet, or Not to Tweet?
Twitter's Long History of Security Incidents In light of Twitter's recent slew of security incidents, including a former employee spying for the Saudi Arabian government and former security chief...
Top Five Data Breaches in Finance History
It's no surprise that the financial sector is one of the most targeted industries by cybercriminals. To put it simply– cybercriminals go where the money is. For hackers, financial institutions offer...
Healthcare: A Major Target for Cyber Threats
Healthcare Industry Threats Organizations within the healthcare industry– including all three sectors services, products, and finance are all vulnerable to cyber threats due to the many...
A Month Check-in After a Needle-Moving Acquisition
Being a realist, we all know acquisitions can be a gamble. As an optimist, I look at them as a game changer that can be an absolute launch point to long-term success. Of course, business history is...
A Guide on Smartphone Security: How to Keep Your Device Secure
One in four mobile applications contains at least one high-risk security flaw. (Via NowSecure) Smartphones, since their rise to popularity in the late 90s and early 2000s, have become a large...