by Lalit Shinde | May 19, 2023 | aiMSSP, aiSIEM, aiXDR, Cyber Security Company
My colleagues and our partners attended the annual IDC South Africa CIO Summit 2023 on May 18, 2023 in Johannesburg. We had many great conversations with our partners and their customers, a few key themes emerged this year. Enterprises are innovating faster than ever...
by Pushpendra Mishra | Feb 3, 2023 | aiSIEM, aiXDR, Cyber Security Company, Ransomware Detection, Service Security Providers
This is Part II of our first blog of the new year, one in which we tackle 2023’s top cyber challenges and provide the information you need to make you ready. We’ll share our insights and recommendations so that you can make cybersecurity a part of your healthy...
by Seceon Thought Leadership | Feb 2, 2023 | aiMSSP, aiSIEM, aiXDR, Awards, Cyber Security Company, Cybersecurity Solution, Ransomware Detection
2022 was the year that cybersecurity affected everyone’s life and lifestyle – it adjusted the price of gas for your car, if you could get a steak at a restaurant, if or when you could see your doctor, and whether or not your favorite gaming site compromised your...
by Randy Blasik | Nov 9, 2022 | aiMSSP, aiSIEM, aiXDR, Awards, Cyber Security Company
As we approach the end of 2022, the Common vulnerabilities and exposure metrics for this year continue to show an upward trend and this is a surprise to no one. Just to level-set everyone, Common Vulnerabilities and Exposures, is often abbreviated as CVE and is a list...
by Pushpendra Mishra | Aug 29, 2022 | aiMSSP, aiSIEM, aiXDR, Cyber Security Company, Uncategorized
A cyber security solutions includes a product or service that helps protect organizations and individuals from damaging cyberattacks. Although often used synonymously, the terms cyber security solution and cyber security solution provider have different meanings. The...
by Randy Blasik | Apr 8, 2022 | aiMSSP, aiSIEM, aiXDR, Company, Cyber Security Company, Cybersecurity Solution
Breaking down a successful cyber-attack in its simplest form; Threat actors use computers as they were designed which is to perform hundreds of millions of operations per second based on dark but creative instructions. Ok, so somewhere on the internet there’s gotta be...