Bachelor of Applied Arts and Science, Professional Concentrations Film Studies and Business Administration from the Rochester Institute of Technology
Privileged accounts are among an organization’s biggest cybersecurity concerns. These accounts give admins control over data, applications, infrastructure and other critical assets that average system users don’t have permission to…
Endpoint detection and response (EDR) is a vital tool for creating an effective security infrastructure for your organization. Endpoints are the most common entry point for malware and other malicious…
Penetration testing is a powerful method for testing the posture of a security system. It shines a light on vulnerabilities that can lead to disastrous data breaches. There are services…
Alexa skills are growing in popularity as users look to extend the capabilities of their Alexa devices. Researchers now believe that the rapid adoption of these skills could have implications…
Antivirus solutions have long been a staple of cybersecurity practices. However, antivirus is no longer enough to protect an entire organization’s infrastructure. Some antivirus solutions have expanded their offerings to…
Kasada is an automated bot detection and mitigation solution designed for enterprise web applications. Its aim is to stop bots from crashing websites, automating fraudulent purchases, credential stuffing, scraping contents…
Malwarebytes Endpoint Protection is an endpoint security solution built to protect against advanced threats. Endpoints are one of the most common means of access for malicious attackers. Each one presents…
The massive SolarWinds breach drove home the point that the cybersecurity threat only gets worse with time, the stakes higher – and the tools more sophisticated. With the cost of…
Corporate networks are complex, and so is the myriad of cybersecurity solutions that protect them. Trying to manage all the security tools in a comprehensive way can leave security teams…
The explosion in remote work that followed the COVID-19 pandemic has shifted corporate models from a main-branch focus to distributed corporate networks and vastly spread out remote employees. That in…
Subscribe to Cybersecurity Insider for top news, trends & analysis