New AI Approach to Endpoint Protection Stops 92% of Cyberattacks but…

Nearly everyone owns an endpoint. We generally call them smartphones or personal computers, but they can also be smart watches or smart TVs. In short, anything you own that can connect to the internet is a potential endpoint. However, they only reach the status of an endpoint when they become part of a network. Endpoint … Continue reading New AI Approach to Endpoint Protection Stops 92% of Cyberattacks but…

Cybersecurity as a Lip Service: Self-deception in the Corporate Cyber World

According to a report from Verizon, one-third of major cybersecurity breaches were traced to mobile devices. This number is probably lower than it really is because many companies don't release details on how they were hacked. One reason they don't want to give this information is because they are embarrassed to admit how lax their … Continue reading Cybersecurity as a Lip Service: Self-deception in the Corporate Cyber World