• Contact Us
  • Support
ziften-logo
MENUMENU
  • Product
    • Zenith
    • ZFlow
    • Ziften Services
  • Solutions
    • Advanced AV
    • Detection & Response
    • Visibility & Hardening
    • Cloud Visibility and Security
  • Partners
    • Channel Partner
    • Fast Start for Microsoft Partners
    • Tech Partners
  • Company
    • Why Ziften?
    • About Ziften
    • Careers
    • Newsroom
    • Events
  • Resources
    • Resources Library
    • Blog
Request a demo
ziften-logo
MENUMENU
  • Product
    • Zenith
    • ZFlow
    • Ziften Services
  • Solutions
    • Advanced AV
    • Detection & Response
    • Visibility & Hardening
    • Cloud Visibility and Security
  • Partners
    • Channel Partner
    • Fast Start for Microsoft Partners
    • Tech Partners
  • Company
    • Why Ziften?
    • About Ziften
    • Careers
    • Newsroom
    • Events
  • Resources
    • Resources Library
    • Blog

Blog

Logan Gilbert | December 10, 2018

9 Endpoint Security Trends for 2019 and Beyond

Endpoint security isn’t a fair fight. Companies have to protect each and every endpoint, while attackers only need to breach one. That might explain why attackers love your…

READ MOREkeyboard_arrow_right
View
12| 24| 48
per page
Josh Harriman | January 31, 2019

5 simple ways to enhance personal security in 2019

In Al Hartman’s recent blog, you learned security tips that would make a difference in your enterprise’s security posture. Now…

READ MOREkeyboard_arrow_right
Al Hartmann | January 17, 2019

5 Enterprise Security Tips for Better Cybersecurity in 2019

For starting out on the right foot in 2019, here are our top 5 cybersecurity New Year’s picks of things…

READ MOREkeyboard_arrow_right
Roark Pollock | November 13, 2018

AI in Cybersecurity: Why Do Cyber-Hacks Still Succeed?

This is my 3rd blog on artificial intelligence (AI) in cybersecurity, coming in the wake of our recent announcement that…

READ MOREkeyboard_arrow_right
Al Hartmann | November 5, 2018

Teaching Cybersecurity to Our Kids Part 5 – Trust and Privacy

The objective of this 5-part blog series is to help you to educate your children in safe cyber usage and…

READ MOREkeyboard_arrow_right
Al Hartmann | October 23, 2018

Teaching Cybersecurity to Our Kids Part 4 – Updates and 2FA

In the first 3 parts of this blog series about teaching cybersecurity to our next generation, our kids, we discussed…

READ MOREkeyboard_arrow_right
Al Hartmann | October 17, 2018

Teaching Cybersecurity to Our Kids Part 3 – Passwords

If the word "password" causes any of the following involuntary reactions, congratulations, you are a normal human being.

READ MOREkeyboard_arrow_right
Al Hartmann | October 10, 2018

Teaching Cybersecurity to Our Kids Part 2 – Email Security

In part 1 of this series about teaching cybersecurity to our next generation, our kids, we started discussing ways to…

READ MOREkeyboard_arrow_right
Roark Pollock | October 9, 2018

Artificial Intelligence (AI) in Cybersecurity: Stopping Fileless Attacks

In a recent blog, we discussed artificial intelligence – or more specifically, machine learning – and its growing role in…

READ MOREkeyboard_arrow_right
Al Hartmann | October 5, 2018

Teaching Cybersecurity to the Next Generation, Our Kids – Part 1

It's back to school time and we are going to take a little break from product talk to discuss the…

READ MOREkeyboard_arrow_right
Michael Vaughn | October 1, 2018

Microsoft Ignite 2018 Recap

Microsoft Ignite Professionals from around the globe stormed Orlando’s Convention Center last week to celebrate Microsoft Ignite. The primary intention…

READ MOREkeyboard_arrow_right
Roark Pollock | August 27, 2018

The Growing Role of Artificial Intelligence in Cybersecurity

Despite, or perhaps because of, the abundance of information and commentary regarding artificial intelligence (AI), specifically as it applies to…

READ MOREkeyboard_arrow_right
Justin Tefertiller | August 21, 2018

The Dynoroot Vulnerability Exploit

This video blog or vlog is showcasing the query we created to find possible evidence of anomalous behavior derived from…

READ MOREkeyboard_arrow_right
  • 1
  • 2
  • 3
  • …
  • 25
  • keyboard_arrow_right

See Ziften in Action

REQUEST A DEMO START A FREE TRIAL
OR SIGN UP TO RECEIVE ZIFTEN UPDATES
ziften-logo

© Copyright 2019 Ziften Technologies, Inc.
All rights reserved.
Privacy & Legal PoliciesCookie Policy

Products

  • Zenith
  • ZFlow
  • Ziften Services

Partners

  • Channel Partners
  • Fast Start for Microsoft Partners
  • Technology Partners

Company

  • Why Ziften?
  • About Ziften
  • Careers
  • Newsroom
  • Events

Solutions

  • Advanced AV
  • Detection & Response
  • Visibility & Hardening
  • Cloud Visibility and Security

Resources

  • Resources Library
  • Blog

Contact

  • Contact Ziften
  • Support

Follow Us