Agile Blog
The latest in cybersecurity news, topics, and trends
Why Cybersecurity in the Space Sector is Crucial
Reliance on Space Assets As the number of satellite systems orbiting in space continues to grow, so does society's dependence on these assets for the functioning of critical systems....
FTC Safeguards Rule for Automotive Dealerships: All You Need to Know
Origin of the FTC Safeguards Rule The origins of the FTC Safeguards Rule can be traced back to the 1999 Gramm-Leach-Bliley (GLBA) act requiring financial institutions to document how they handled...
Top October 2022 Cyber-Attacks
It’s the end of October 2022, and the numbers are in– below is a list of the most malicious cyber-attacks over the past month. As reported by Kon Briefing, cyber-attacks have affected more than 27...
Ransomware: Wreaking Havoc on American Schools
Well, most of us could say that we saw this coming. Ransomware began wreaking havoc on businesses globally amid the COVID-19 pandemic, however, these malicious actors have their eyes set on a...
XDR Have You Confused? We’re Here to Help.
A Brief History of XDR Coined in 2018 by Nir Zuk, Palo Alto Network’s CTO, “extended detection and response” (XDR) is a term that often incites great debate on the specifics of its definition. This...
Most Malicious Malware Threats of 2022 Ranked by OpenText
For the fifth year in a row, OpenText Security Solutions has ranked the year’s “nastiest” malware threats. After rummaging through data and analyzing behaviors, OpenText could determine...
Tackling the Increase in Cloud Complexity and Incidents
Increase in Cloud Complexity In recent years, cloud adoption among organizations has multiplied, and so has the complexity of these cloud services. According to Thales 2022 Cloud Security Report,...
Top September 2022 Cyber-Attacks
It’s the end of September 2022, and the numbers are in– keep reading for the most malicious cyber-attacks over the last thirty days. As reported by Kon Briefing, cyber-attacks have affected more...
A Modern Approach to Defeating Identity-Based Attacks
The past year of cyber crime has been extraordinarily memorable. In Verizon’s most recent Data Breach Investigation Report, they revealed that there were 23,896 security incidents, of which, 5,212...
Cyber Insurance Costs are on the Rise Due to Increase in Cyberattacks
Having written policies and procedures for your IT protocols is the best practice for running a business. However, now more than ever, if a company is looking for cyber insurance, it’s going to be...