2023 Global Threat Intelligence Report
Line between cyberthreats and physical impact continues to blur.
View The ReportBlog
Stay up to date on the latest tech, trends and threats.
How XDR Simplifies Implementing Robust Cybersecurity
Implementing robust cybersecurity is a complex undertaking. The individuals responsible for securing an IT environment must have the knowledge and tools to guard against increasingly sophisticated threat actors.
September 20, 2023 | XDR
How XDR Helps SMBs Provide Cost-Effective Cybersecurity
Businesses of all sizes need to protect their IT environments from the dangers posed by hackers and threat actors. In today’s threat landscape, all companies need to address the dangers posed to the survival of their businesses by cyberattacks.
September 13, 2023 | XDR
How Samurai XDR Boosts Security by Efficiently Detecting Threats
The threat landscape affecting an organization’s IT environment is constantly changing. Threat actors working alone or in organized groups are continuously looking for new methods with which to compromise business-critical systems and valuable data resources.
September 8, 2023 | XDR
Cybersecurity Leader NTT Offers SaaS Subscriptions to its Patented XDR Platform
NTT Security Holdings today announced the launch of Samurai XDR SaaS, making their advanced threat detection and response system accessible to organizations of all sizes for just $40 per endpoint per year.
September 5, 2023 | Announcements
How Honeytokens and XDR Can Improve the Detection of Threat Actors
Threat actors are continuously searching for new and sophisticated ways to exploit weaknesses in an organization’s cyber defenses. The use of honeytokens can help identify potential threats and minimize the damage they can cause to an IT environment.
July 31, 2023 | Cybersecurity 101
XDR: Simplifying Security Through Visual Learning - Our New Infographic
We are thrilled to share our newly designed infographic 'Demystifying XDR: A Visual Guide.' In our latest blog post, we will walk you through what the infographic covers and why it's a must-see for anyone interested in cybersecurity.
July 24, 2023 | Cybersecurity 101
Cybersecurity and Healthcare: Protecting our Most Sensitive Data
Healthcare providers are particularly prone to cyberattacks due to the type and importance of the information they process. We’re going to look at why healthcare organizations are attacked, the dangers inherent in these attacks, and how to enhance cybersecurity with an XDR solution.
June 30, 2023 | Cybersecurity 101
The Importance of Comprehensive Telemetry for an XDR Platform
The effectiveness of XDR solutions depends on the breadth and quality of the telemetry made available to the platform. The complexity of modern IT environments requires the broad collection of diverse telemetry from all areas of the infrastructure.
June 30, 2023 | XDR
How XDR Helps Defend Your Business From SEO Poisoning
SEO poisoning is a method that threat actors employ in an attempt to entice users into visiting malicious websites. In this blog post, we will take a close look at SEO poisoning and discuss methods that can be used to detect and prevent this malicious activity.
June 29, 2023 | XDR
Why SMBs Need to Implement Strong Cybersecurity Solutions
Most SMBs have valuable enterprise data resources and IT environments that need to be protected. While the headlines may concentrate on data breaches and exploited vulnerabilities affecting larger companies, falling victim to a cyberattack can be devastating.
June 29, 2023 | Cyber Threats
What is Juice Jacking and How Does it Hurt Your Business?
Juice jacking is a cybersecurity threat that poses a direct danger to an individual’s personal business-related mobile devices. The exploit leverages the architecture of mobile devices that uses the same connection to provide power or transfer and synchronize data.
June 29, 2023 | Cybersecurity 101
What is Generative AI and How Does it Impact Cybersecurity?
We are going to look at the ways generative AI is poised to positively and negatively impact cybersecurity. As the technology matures, it will be incorporated into defensive cybersecurity solutions. Unfortunately generative AI will also provide new opportunities that can be exploited by cybercriminals and threat actors.
June 5, 2023 | Cybersecurity 101
How You Can Minimize the Risk of Business Email Compromise
Business Email Compromise (BEC) is a type of cyberattack where a threat actor employs social engineering techniques such as spear phishing and whaling to gain access to a victim’s email account. The compromised email account is then used to impersonate the victim.
June 5, 2023 | Cybersecurity 101
Featured articles
How XDR Simplifies Implementing Robust Cybersecurity
20 September 2023 | XDR
Implementing robust cybersecurity is a complex undertaking. The individuals responsible for securing an IT environment must have the knowledge and...
How XDR Helps SMBs Provide Cost-Effective Cybersecurity
13 September 2023 | XDR
Businesses of all sizes need to protect their IT environments from the dangers posed by hackers and threat actors. In...
How Samurai XDR Boosts Security by Efficiently Detecting Threats
8 September 2023 | XDR
The threat landscape affecting an organization’s IT environment is constantly changing. Threat actors working alone or in organized groups are...