Agile Blog
The latest in cybersecurity news, topics, and trends
A Month Check-in After a Needle-Moving Acquisition
Being a realist, we all know acquisitions can be a gamble. As an optimist, I look at them as a game changer that can be an absolute launch point to long-term success. Of course, business history is...
A Guide on Smartphone Security: How to Keep Your Device Secure
One in four mobile applications contains at least one high-risk security flaw. (Via NowSecure) Smartphones, since their rise to popularity in the late 90s and early 2000s, have become a large...
Top July 2022 Cyber Attacks
The numbers are in for July 2022– and let's just say you'll want to keep reading. As reported by Kon Briefing, cyber-attacks have affected more than 23 countries worldwide, with an estimated 54...
The Biggest Security Threat to Cloud Computing and How to Protect Your Organization
36% of organizations reported that their business suffered a breach in the last year, according to a 2021 Fugue report on the state of cloud security. The biggest threat to cloud...
The Impact of Ransomware on Gas & Oil Industries
Current State of Ransomware Attacks on Energy The increased dependence on digital communication, automation, and technology within major industries has posed a higher risk for cyber threats...
Top Threats to Chromebooks and ChromeOS
The popular consensus that Chromebooks and ChromeOS are superior in security among other devices and operating systems can be a dangerous belief that leads to complacency and negligence in...
Top June 2022 Cyber Attacks
June 2022 proved to be a trying time for organizations to keep their data safe from cyber criminals, as over 80 security incidents and 34.9 million records were breached, as reported by IT...
Understanding Zero-Trust Security
Businesses are still adapting to what seems to be the new normal post-pandemic. There are more organizations relying on the cloud for securing valuable assets than ever before, but they’re still...
Top 3 Reasons SMBs Should Use SIEM
Security Information and Event Management– otherwise known as SIEM, is a cybersecurity solution that monitors an organization’s IT infrastructure by relaying actionable intelligence and allowing IT...
Understanding AICPA SOC for Cybersecurity
What is SOC Compliance? The term SOC stands for Service Organization Control. SOC compliance refers to whether a service provider meets the set of standards in a SOC audit, created by the American...