The Complete Guide to Ransomware

The Complete Guide to Ransomware

This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks start, how they progress through an organization’s endpoints and broader network, and what you can do to prevent them — or at least shut them down — to...
ISSA Event: CMMC From the Sub’s Perspective

ISSA Event: CMMC From the Sub’s Perspective

Simple Helix partnered with the North Alabama Chapter of the Information Systems Security Association (NAC-ISSA) to host a virtual discussion panel event on September 15, 2020. During the event, the CMMC discussion was examined through the lens of the...
Trending Phishing Techniques & Tips for Detection

Trending Phishing Techniques & Tips for Detection

No other cyber threat plagues the world like phishing attacks. This email-borne threat action tops the list as the most used initial attack vector in data breaches today. Learn more about how to protect yourself against phishing by downloading the “Trending...
Duo’s Trusted Access Report

Duo’s Trusted Access Report

Here’s the thing, the secure perimeter as you know it is evolving. The explosion of cloud applications and mobility has expanded the concept of a perimeter security architecture, which assumes that every user and device inside company walls is secure and...