endpoint, QR code security

Endpoint Example: QR Codes & Poor Security Habits

In the world of remote work, every employee is an endpoint—no less the employee’s devices. As the line between work and home has blurred, so too has the line between personal and professional devices: how…
Threat Detection

Hostile Strangers: Thinking Through an ‘Assumption of Breach’ Mentality

To paraphrase essayist Joan Didion: since the entrance of unexpected strangers is a given, maturity chiefly consists of the ability to acknowledge that sometimes those strangers will be hostile. Mature security strategy likewise faces this disconcerting…
Report on the Future of Cyber Security

Darktrace Releases Report on the Future of Cyber Security

Commissioned by Darktrace and produced by SINC and the Analyst Syndicate, this report explores how IT security executives are approaching autonomous defense systems in the face of increasingly automated attacks. Based on hundreds of responses from industry…

Speaker Spotlight – How Do I Avoid Being the Next Cyber Victim? with Scott Augenbaum

We are excited to welcome, Scott E. Augenbaum, Retired FBI Cyber Division Supervisory Special Agent to our SINC Midmarket IT & Security Leaders Virtual Forum on September 16th, for a session and open Q&A over…

Speaker Spotlight – Securing Workflows with Hardware Innovation with James Morrison

We are delighted to welcome James Morrison, Distinguished Technologist of Cybersecurity at Hewlett Packard Enterprise to our SINC Midmarket IT & Security Leaders Virtual Forum next month! We caught up with James to learn about…