Ericom Blog

The Ericom team and guest bloggers share their latest thinking on Zero Trust, SASE and the key cyber issues of the day.

Time to Rethink Layered Security

In this post, we update the layered security concept for the age of Zero Trust, cloud computing, application-based work and work-from-anywhere.

Read More

GenAI - throwing caution to the winds

In the race for productivity, the allure of GenAI is overcoming the caution with which businesses generally approach risky, game-changing technologies.

Read More

Cyber risks in education: Safeguarding K-12 institutions

K-12 schools must balance the educational and administrative benefits of web use with the potential risks to students and school security associated with internet access.

Read More

AI is Making Unmanaged Devices More Dangerous

Unmanaged devices are a growing concern for many organizations. AI-enabled zero day attack creation is set to increase this and other threats.

Read More

What’s up with cybersecurity down under?

Following a series of serious, high-profile cyberattacks, Australia has grown more serious about promoting the Essential Eight, a cybersecurity framework.

Read More

Don’t Gamble with Your Cybersecurity

Recent cyberattacks combined stolen credentials, social engineering, MFA resets and SSO manipulation in what’s been described as the Ocean’s 11 of the cyber age.

Read More

“Operation Duck Hunt” Shuts Down QakBot Botnet

The FBI-led takedown of Qakbot was an operation that involved seven countries. Malware was removed from 700,000 computers. But don’t think all that makes you safe.

Read More

How GenAI is Supercharging Zero-Day Cyberattacks

Generative AI empowers its users to work fast, better and more efficiently. Alas, this includes cybercriminals, who are using malicious GenAI platforms to accelerate zero-day exploit creation.

Read More

Cybercriminals Disdain the Law, But Find Law Firms Attractive

Cybercriminals love the multiplier effect they get from attacking law firms: Hack in, and they get firm data PLUS juicy confidential client info.

Read More

Moving to a Zero Trust isolation-based security approach is faster and easier than you think.

Get a 1:1 Demo