2022 Global Threat Intelligence Report

A year of more sophisticated and substantial threats.

View The Report

Blog

Stay up to date on the latest tech, trends and threats.


Vulnerability Management

Vulnerability Management

A threat is an active danger poised against your business, a hacker or malware that is trying to break through your defenses. A vulnerability, on the other hand, is a weakness that can be exploited by a threat.

September 23, 2022  |  Security

Everything you need to know about spear phishing cyber attacks

Everything you need to know about spear phishing cyber attacks

Spear phishing is a type of phishing attack that’s targeted at a specific (typically senior) individual within an organization. These attacks are usually carried out by email, and the attacker will use personal information to make the email seem more legitimate.

September 23, 2022  |  Security

Samurai Threat Intelligence - what is it and how our customers get value

Samurai Threat Intelligence - what is it and how our customers get value

Threat intelligence is a critical component of any cybersecurity approach, it assists in identifying and tackling existing and new waves of cyber threats. But not all threat intelligence is created equal.

September 19, 2022  |  Security

The worst cyber attacks of 2022 (so far)

The worst cyber attacks of 2022 (so far)

From ransomware to data breaches, businesses and individuals have suffered some of the worst cyber attacks in history — and we’re only in Q3! Here we round up some of the worst attacks and trends in the industries being targeted by hackers in 2022.

September 9, 2022  |  Security

How to detect threats in the cloud

How to detect threats in the cloud

The exact same characteristics that are beneficial in cloud systems are also potential vulnerabilities — so we’ve created this blog post to help you navigate these weaknesses and equip you with ways to detect threats in the cloud.

September 1, 2022  |  Security

What is a botnet?

What is a botnet?

In this post, we're going to be demystifying one example of jargon, botnets; a class of threat actors that’s been around for a while now but that you may not have heard of.

September 1, 2022  |  Security

4 ways MDR solves security operations challenges

4 ways MDR solves security operations challenges

Security operations risk getting overlooked in some organizations. A finance team? You know you need that to stay on top of the books. Sales and marketing? Well, of course, who else is going to bring the business in. And yet, each of these colleagues risks being out of a job in the event of a significant security breach.

September 1, 2022  |  Security

Zero trust security: Everything you need to know

Zero trust security: Everything you need to know

Zero trust security is a relatively new concept — and one that’s gaining in popularity. In this blog post, we discuss what zero trust security is, how it works, and some of the benefits that it can provide for your business.

August 30, 2022  |  Security

What is malware & why (or how) do cybercriminals use it?

What is malware & why (or how) do cybercriminals use it?

All modern businesses have sensitive data or assets that have been digitized or can be accessed digitally. Most likely your business does too, so malware prevention should be on your radar.

August 23, 2022  |  Security

What is modern-day remote incident response?

What is modern-day remote incident response?

With traditional employees, remote workers, and hybrid workers, maintaining a secure wall around your business is uniquely difficult, if not impossible. Unfortunately we have to live with a new reality where it is not a question of “if” but rather “when” we will be hit by a cyber threat.

August 11, 2022  |  Security

Global Threat Intelligence Report trends: the latest in cybersecurity threats

Global Threat Intelligence Report trends: the latest in cybersecurity threats

NTT’s Global Threat Intelligence Report (GTIR) is a comprehensive report providing insights into the latest cyber security threats and trends. This year's report provides an in-depth look at the latest threats facing businesses and individuals around the world.

August 8, 2022  |  Security

The 6 most common types of cyber attacks and how to prevent them

The 6 most common types of cyber attacks and how to prevent them

When it comes to cybersecurity, the phrase 'knowledge is power' couldn't be more true. The less you and your staff know about cybersecurity threats and best practices, the more vulnerable you will be.

August 8, 2022  |  Security

Cyber threats are more common than you think: protect yourself with tips from the experts

Cyber threats are more common than you think: protect yourself with tips from the experts

Ransomware attacks occurred every 11 seconds in 2021. Yes, there’s a very real threat out there, but we’re here to tell you that it’s possible (and easier than you might think) to protect your business and your data.

August 3, 2022  |  Security

The benefits of XDR and how it works to keep your network secure

The benefits of XDR and how it works to keep your network secure

When it comes to network security, few offerings are as effective, affordable, and comprehensive as XDR. It goes a step beyond EDR, and when it comes to real-world use cases, there's no competition.

July 28, 2022  |  Security

MSSP, SIEM, MDR, and SOC as a Service compared

MSSP, SIEM, MDR, and SOC as a Service compared

In this post, we're going to be covering four of the most popular cybersecurity solutions available in 2022: MSSP, SIEM, MDR, and SOCaaS, looking at their individual strengths and weaknesses. This way, you can find the solution that's most effective for your business.

July 25, 2022  |  Security

MDR threat hunting: how to improve your cybersecurity

MDR threat hunting: how to improve your cybersecurity

Cybersecurity is a critical issue for businesses of all sizes. In order to protect your data, customers, staff, and reputation, you need to have a comprehensive security strategy in place.

July 19, 2022  |  Security

XDR and data flow: XDR solutions bring together data from across an organization in order to respond quickly and accurately to cyber threats

XDR and data flow: XDR solutions bring together data from across an organization in order to respond quickly and accurately to cyber threats

The world of cybersecurity can be intimidating and full of jargon. But after reading this post, you’ll feel as confident as we are in our upcoming product: Samurai XDR.

July 19, 2022  |  Security

AI in cybersecurity: real-world examples of how AI can be used

AI in cybersecurity: real-world examples of how AI can be used

In 2022, it’s hard to think of an industry that hasn’t undergone an AI transformation — and for good reason. Those involved in cybersecurity have already seen how AI can be used to better safeguard a businesses.

July 15, 2022  |  Security

5 things every business should know about AI and cybersecurity

5 things every business should know about AI and cybersecurity

It's clearer than ever that cybersecurity is a top priority in 2022. Securing your networks and devices is essential to keep your business protected and safeguard your assets against the growing risk of digital attacks and fraud.

July 5, 2022  |  Security

The top 5 cyber attacks of 2021: the most dangerous attacks last year

The top 5 cyber attacks of 2021: the most dangerous attacks last year

The cybersecurity field is one of tech’s most rapidly evolving areas. New threats are being uncovered all the time, and new defenses are being discovered and implemented, too. And at the core of this rapid evolution is AI.

June 30, 2022  |  Security

The future of cyber security is here, and artificial intelligence is part of it

The future of cyber security is here, and artificial intelligence is part of it

The cybersecurity field is one of tech’s most rapidly evolving areas. New threats are being uncovered all the time, and new defenses are being discovered and implemented, too. And at the core of this rapid evolution is AI.

June 30, 2022  |  Security

Three current cybersecurity trends to watch in 2022

Three current cybersecurity trends to watch in 2022

The cybersecurity landscape is constantly changing, and businesses need to stay on top of the latest threats if they want to protect themselves. So, let’s look at some cybersecurity trends we’re seeing right now. From ransomware attacks, insider threats, and data breaches — learning more about the state of cybersecurity can help you stay safe.

June 29, 2022  |  Security

NTT Security Holdings launches Managed Detection and Response (MDR) platform to protect businesses and organizations

NTT Security Holdings launches Managed Detection and Response (MDR) platform to protect businesses and organizations

New Samurai XDR application, Samurai MDR, creates visibility across all telemetry sources for discovering and disrupting sophisticated cyberattacks.

June 1, 2022  |  Press

How MDR works (+ how MDR is different vs MSSP)

How MDR works (+ how MDR is different vs MSSP)

Managed detection and response, or MDR, is one of the most popular and recent forms of cybersecurity protection. And while many businesses are upgrading to MDR, others are looking to go with MSSP instead.

May 26, 2022  |  Security

Threat hunting and MDR

Threat hunting and MDR

MDR is one of the most modern, useful forms of cybersecurity protection — and its threat hunting capabilities are part of what makes the technology so beneficial.

May 24, 2022  |  Security

What is Managed Detection and Response (MDR)?

What is Managed Detection and Response (MDR)?

With the recent rise in cybersecurity threats, businesses and IT teams are working overtime to secure their data and networks. As you can imagine (or, more likely, already know), this can eat up a significant amount of resources and energy.

May 12, 2022  |  Security

Network traffic analysis (NTA): the need-to-knows

Network traffic analysis (NTA): the need-to-knows

Your technology and data are up there with your greatest business assets. And that means that your network is the gateway to your most valuable — and vulnerable — resources. That's why network security, and by extension NTA network traffic analysis, is so important.

May 10, 2022  |  Security

Vendor agnostic XDR

Vendor agnostic XDR

Cybersecurity is crucial in today's day and age. However, not all cybersecurity solutions are created equal.

May 5, 2022  |  Security

What you need to know about endpoint security (and why it’s not just a buzzword)

What you need to know about endpoint security (and why it’s not just a buzzword)

If you're paying attention to your business's cybersecurity, then you've probably come across endpoint security. It's the hip new thing in the world of network protection. But what is it? And can you just use antivirus instead?

May 3, 2022  |  Security

Endpoint detection and response (EDR)

Endpoint detection and response (EDR)

Every business has endpoints. That's your computers, mobile devices, servers, IoT devices, and cloud workspaces. In 2022, you can't get around using these things — so you can't get around endpoint detection and response, either.

April 26, 2022  |  Security

Do I need an XDR?

Do I need an XDR?

If you're feeling like cybersecurity threats are mounting, then you're not alone. Dealing with new types of attacks, developing effective strategies, finding the right tools, and having the right staff on hand can seem like tricky obstacles to overcome.

April 19, 2022  |  Security

9 low-cost cybersecurity solutions for SMBs

9 low-cost cybersecurity solutions for SMBs

95% of all cybersecurity breaches are the result of human error. That means that 95% of breaches are easily preventable with the right training and solutions in place. And in this post, that's exactly what we're going to cover.

April 12, 2022  |  Security

What problem does XDR solve?

What problem does XDR solve?

Cybersecurity is a top priority in 2022, which is why so many businesses are looking to revamp their security approach. Many have found that through assessments (or perhaps even the hard way) that their current cybersecurity measures aren't cutting it.

April 5, 2022  |  Security

What is Extended Detection & Response (XDR)?

What is Extended Detection & Response (XDR)?

Keeping your business secure should be a top priority in 2022. It gives your customers and staff greater peace of mind, reduces your overhead, and builds trust that will extend for years to come.

March 29, 2022  |  Security

We value your privacy.

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. By clicking "Accept", you consent to our use of cookies.