Agile Blog
The latest in cybersecurity news, topics, and trends
Tips for Crafting a Proactive Cybersecurity Strategy
More often than not, business leaders’ attitudes towards the deployment of security tools are set-it-and-forget-it. Yet, the state of cybersecurity is everchanging; it isn’t a passive endeavor. If...
Spear Phishing: What it is and How to Protect Your Organization
What is Spear Phishing? Don’t let the terminology confuse you– spear phishing is not the act of hunting for fish in the ocean, it’s a specific type of phishing attack where cyber criminals use...
Understanding the Difference Between EDR, XDR and MDR
Understanding the cybersecurity terminology and acronyms can have your head spinning. Whether you’re just beginning to understand the industry or a veteran who is trying to keep up with new...
How Effective are your Cybersecurity Solutions Against Today’s Threats?
Staying in the Know Today, determining the effectiveness of an organization’s cybersecurity operations is challenging to say the least, especially with the rate at which new threats emerge each...
How to Protect your Growing Number of IoT Devices
What is IoT? The Internet of Things (IoT) describes the network of physical objects – “things” – that are embedded with sensors, software, and other technologies to connect and exchange data with...
Update on New Mandated Federal Cyber Policies
On March 15, President Joe Biden signed into law the Cyber Incident Reporting for Critical Infrastructure Act. This Act mandates that private sector entities must inform the Cybersecurity and...
Okta Confirms Investigating a Potential Breach
Early on March 22, Single-Sign-On provider Okta, an organization that allows people to use one account to log into multiple digital services, confirmed they are investigating a potential breach by...
Why XDR Increases Operational Efficiency for MSPs
At its core, eXtended Detection and Response (XDR) is a holistic approach to threat detection, as it automatically detects and responds to multiple security layers all in one platform. Considering...
FBI Film-Made in Beijing: The Plan for Global Market Domination
The FBI’s office of Private Sector, Counterintelligence Division, and Training Division recently released the below 30-minute film titled: Made in Beijing: The Plan for Global Market Domination. The...
Cloud Misconfiguration: What it is & How to Avoid it?
The recent rise in cyber threats comes as a result of the increase in cloud adoption across the globe, intending to increase business agility and resilience. However, that doesn’t mean electing to...