Cyber Threats
Protecting Your Clients During the Holiday Season: A Guide for Family Offices
The holiday season is a time of joy and celebration, but it’s also a prime time for cybercriminals to target high-net-worth individuals. While family offices are constantly focused on protecting their clients’ ...

The New Era of Cybersecurity: Gartner’s Vision for Preemptive Defense
Gartner's report, Emerging Tech: Top Use Cases in Preemptive Cyber Defense, highlights the emergence of preemptive cyber defense technologies as a game-changing approach to cybersecurity ...

Cyber Scams & Why We Fall for Them
Gary Perkins, Chief Information Security Officer Social engineers rely on two key psychological triggers: urgency and empathy. When people feel rushed or that they are helping someone in need, their normal critical ...
Escalation of Cyber Warfare in the Israel-Palestine Conflict: A Deep Dive into Recent Israeli Breaches
The geopolitical conflict between Israel and its adversaries has shifted into the digital sphere, where sophisticated cyberattacks have become a primary tool for targeting critical sectors. In recent months, cyberattacks have exposed ...

Air-Gapped Systems Breached: A Deep Dive into the Attack and Prevention
Once considered impregnable bastions of security, air-gapped systems have been shown to be vulnerable to sophisticated attacks. These systems, physically isolated from networks, were believed to be immune to remote hacking ...

Identity Under Siege: Responding to the National Public Data Breach
Gary Perkins, Chief Information Security Officer, CISO Global While the scale of this data breach is alarming – with 277 gigabytes of data reportedly stolen – it’s important not to panic. Instead, ...
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for August
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In August, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...
Century-Long Innovation: A Legacy of Outpacing Cyber Threats
Discover how Komori, a century-old printing giant, is leading the charge in cybersecurity innovation by adapting to internet-connected risks and utilizing advanced solutions like NodeZero to safeguard their legacy. The post Century-Long ...
The Deception Game: How Cyber Scams Manipulate Trust to Access Sensitive Information
In recent years, the landscape of cyber scams has evolved, targeting even the tools designed to protect consumers. One such concerning development involves the exploitation of trusted services to mislead and scam ...
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...