Our Blog
Home / Blog

(Un)expected Lessons in Cybersecurity – Business and Security Strategies for The Post-Pandemic Unbound Enterprise
As long-time security practitioners, many of us probably at least once thought or said that ‘we knew something like this would be possible’. However, none of us could have known what would be the realities, including duration and impacts of the pandemic nor what the...

Aligning Data Security with Organizational Strategy
The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch. Whether data is grabbed in a headline-making...

All You Need to Know about TISAX
The rise of smart and connected cars in the last decade has led to a sharp increase in cyberattacks involving automobiles. According to Upstream Security’s 2020 Automotive Cybersecurity Report, the number of annual automotive cybersecurity incidents has increased by a...

Protecting Against Evolving Ransomware Attack Trends
Ransomware attack trends continue to evolve, and the current iterations are no exception. During the last year, malicious actors have attacked healthcare organizations, medical trials, schools, and shipping agencies. Considering the impact these modern attacks can...

FinTech’s popularity signals that it’s time to get serious about apps
If there is one clear takeaway from our investigation into FinTech, it’s that it is high time to put app security first. The convenience, automation, and data analysis offered by apps to users is no longer limited to the games, flashlight optimizers and anti-stress...