Climbing the compliance ladder without breaking a sweat
In this series, in conjunction with Agile Cybersecurity Solutions (ACS, our cybersecurity testing and consulting partner), Keypoint Intelligence investigates the many facets of cybersecurity to deliver insight and strategy. Check back here next Tuesday for more free tips and tricks, helpful hints, as well as solutions and tools—all to help you navigate the potentially treacherous waters of cybersecurity.PCs and print devices remain protected as cyber threats continue to evolve
Subject matter experts from every corner of HP Inc. addressed a core group of industry analysts at the HP Security Summit 2023, held in New York City on December 12. We discuss here the highlights of this event as well as our insight into HP's directions into cybersecurity and it's Wolf Security ecosystem.Essential tools to combat AI-powered attacks
In this series, in conjunction with Agile Cybersecurity Solutions, Keypoint Intelligence investigates the many facets of cybersecurity to deliver insight and strategy—including the use of artificial intelligence by hackers and those seeking to thwart their efforts. We discuss here the key implications of AI's use in hacking as well as how it can be utilized to defend against bad actors.Stay ahead of the fastest-growing concern in cybersecurity
In this series, in conjunction with Agile Cybersecurity Solutions (our cybersecurity testing and consulting partner), Keypoint Intelligence investigates the use of artificial intelligence (AI) and machine learning techniques in hacking cybersecurity. We discuss here the key tactics of AI hacking and how to overcome it.A New Challenge for Cybersecurity
In this series, in conjunction with Agile Cybersecurity Solutions (our cybersecurity testing and consulting partner), Keypoint Intelligence investigates the many facets of cybersecurity to deliver insight and strategy. We discuss here some of the key uses of AI as malware and provide some insight into how to combat them.Updated model for cyber best practices to debut in early 2024
The US Department of Commerce’s National Institute of Standards and Technology (NIST) has recently announced an upcoming update to its Framework for Improving Critical Infrastructure Cybersecurity (CSF). We discuss here the potential changes and implications thy can have for cybersecurity initiatives.The horrors of poor management and IoT attacks
In conjunction with ACS (our cybersecurity testing and consulting partner), we discuss here the dangers of inadequate endpoint and IoT management, which can leave organizations vulnerable to all sorts of cyberattacks. Endpoint detection and response (EDR) solutions are a cybersecurity technology that continually monitors and analyzes endpoint data to detect and respond to anomalous and potentially malicious activity.A recap of Ricoh’s first large-scale event in four years!
The Ricoh Summit, held in Denver, CO, from October 10-13, brought together the Ricoh team, Ricoh dealers, industry leaders, and exhibitors ranging from software, services, as well as customer relationship management (CRM) and sales enablement providers, all with focused offerings for the channel.A turnkey IT security subscription service designed to safeguard SMB security
In what was great timing for October’s Cybersecurity Awareness Month, Sharp Europe recently held an analyst event where the company announced a focus on helping SMBs improve their security.COVID popularized them, but will this take them out?
QR codes have become a critical link between print and digital communications, enabling marketers to direct consumers to websites to further personalize, direct, and track their customer experience. We discuss here the recent QR patent lawsuits brought on by Symbology Innovations and the effect they can have on the market.