Protecting Your Clients During the Holiday Season: A Guide for Family Offices

The holiday season is a time of joy and celebration, but it’s also a prime time for cybercriminals to target high-net-worth individuals. While family offices are constantly focused on protecting their clients’ ...
The New Era of Cybersecurity: Gartner’s Vision for Preemptive Defense

The New Era of Cybersecurity: Gartner’s Vision for Preemptive Defense

Gartner's report, Emerging Tech: Top Use Cases in Preemptive Cyber Defense, highlights the emergence of preemptive cyber defense technologies as a game-changing approach to cybersecurity ...
Cyber Scams & Why We Fall for Them

Cyber Scams & Why We Fall for Them

Gary Perkins, Chief Information Security Officer Social engineers rely on two key psychological triggers: urgency and empathy. When people feel rushed or that they are helping someone in need, their normal critical ...

Escalation of Cyber Warfare in the Israel-Palestine Conflict: A Deep Dive into Recent Israeli Breaches

The geopolitical conflict between Israel and its adversaries has shifted into the digital sphere, where sophisticated cyberattacks have become a primary tool for targeting critical sectors. In recent months, cyberattacks have exposed ...
Air-Gapped Systems Breached: A Deep Dive into the Attack and Prevention

Air-Gapped Systems Breached: A Deep Dive into the Attack and Prevention

Once considered impregnable bastions of security, air-gapped systems have been shown to be vulnerable to sophisticated attacks. These systems, physically isolated from networks, were believed to be immune to remote hacking ...
Identity Under Siege: Responding to the National Public Data Breach

Identity Under Siege: Responding to the National Public Data Breach

Gary Perkins, Chief Information Security Officer, CISO Global While the scale of this data breach is alarming – with 277 gigabytes of data reportedly stolen – it’s important not to panic. Instead, ...

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for August

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In August, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...

Century-Long Innovation: A Legacy of Outpacing Cyber Threats

Discover how Komori, a century-old printing giant, is leading the charge in cybersecurity innovation by adapting to internet-connected risks and utilizing advanced solutions like NodeZero to safeguard their legacy. The post Century-Long ...

The Deception Game: How Cyber Scams Manipulate Trust to Access Sensitive Information

In recent years, the landscape of cyber scams has evolved, targeting even the tools designed to protect consumers. One such concerning development involves the exploitation of trusted services to mislead and scam ...

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...