Agile Blog
The latest in cybersecurity news, topics, and trends
Okta Confirms Investigating a Potential Breach
Early on March 22, Single-Sign-On provider Okta, an organization that allows people to use one account to log into multiple digital services, confirmed they are investigating a potential breach by...
Why XDR Increases Operational Efficiency for MSPs
At its core, eXtended Detection and Response (XDR) is a holistic approach to threat detection, as it automatically detects and responds to multiple security layers all in one platform. Considering...
FBI Film-Made in Beijing: The Plan for Global Market Domination
The FBI’s office of Private Sector, Counterintelligence Division, and Training Division recently released the below 30-minute film titled: Made in Beijing: The Plan for Global Market Domination. The...
Cloud Misconfiguration: What it is & How to Avoid it?
The recent rise in cyber threats comes as a result of the increase in cloud adoption across the globe, intending to increase business agility and resilience. However, that doesn’t mean electing to...
Cybersecurity Advisory: Protecting Cleared Defense Contractor Networks Against Years of Activity by Russian State-Sponsored Actors
Summary: It is known from at least January 2020, through February 2022, the Federal Bureau of Investigation (FBI), National Security Agency (NSA), and Cybersecurity and Infrastructure Security...
Cloud-Based Hosting VS On-Premises
It’s not uncommon for organizations to fear moving to the cloud – yet, moving to the cloud is an increasingly popular choice nowadays. Although CIO’s and CTO’s view on-premises hosting to be much...
7 Ways Hackers Steal Passwords and How to Prevent it
Password protection is the most common login and data protection tool today. There aren't many apps, websites or ecommerce sites that don't require you to use password protection and that's just to...
Why SMBs are Most Vulnerable to Ransomware
SMBs: The Perfect Target The threat of ransomware to small and medium sized businesses (SMBs) has rapidly increased over the last few years, as cyber hackers are now opting to choose easier, smaller...
Cyber Simulation Found Hackers Penetrate 93% of Local Company Network
A recent cyber simulation carried out by Positive Technology’s researchers found that external hackers breached 93% of organizations’ perimeter networks and on average gained access to internal...
5 Ways to Prevent a Cyberattack in 2022
As we approach the beginning of another new year, organization's must construct a new and improved security strategy. In this article we will highlight what AgileBlue considers to be the 5 best...