In The Trenches Logo The Devolutions Blog
The Front Line Against
IT Chaos & Cyber Threats

Security

What Is EDR and Why Do You Need It?

In today’s volatile technology landscape, threat actors use poorly-secured endpoints as a backdoor into the network. These attackers take advantage of the fact that most endpoints are operated and mai...

Malware Basics: What You Need to Know

Before you can protect your devices and organization against malware attacks, you need to know what you're fighting against – and I’m sorry to say, but it's really scary. It kind of makes the Night Ki...

Robust IT Security Comes to the Cloud

For several years, the business argument to elevate platforms, apps and data to the public cloud has been characterized by the “Yes, it’s a great idea, but what about security?” narrative. Let’s start...

20 Shocking Statistics About Cybercrime

Just how massive and destructive has cybercrime become? Here are 20 statistics that paint a shocking picture — like InfoSec World’s version of Edvard Munch’s The Scream. The cybercrime economy has ...

Surveys Reveal the #1 Fear of IT Pros

It’s not that the corporate Powers That Be will enforce a dress code (since when is a t-shirt that says “I went outside once but the graphics weren’t very good” not formal?!). It’s not the possibility...