logo

RevBits News

Learn more about the ever changing cybersecurity attack vector with these data-driven blog posts.

Request a Demo
Hacker breaking into various endpoints.
April 13, 2020

The Worst Breach Detection and Data Storage Mistakes of 2019

In 2019, as the volume of cyber attacks continued to spike, cybercriminals were increasingly successful in infiltrating corporations’ sensitive data and information. A lot of these attacks, however, were the result of outdated cybersecurity systems and ineffective handling and encryption of sensitive data. As a result, companies around the world lost millions of dollars and spent countless hours working to clean-up the aftermath of costly data-breaches and malware attacks. As the cybersecurity landscape continues to advance in 2020, companies must have a comprehensive security suite that includes breach detection, EDR, email security and privileged access management software.

Cybersecurity shield protecting endpoints.
March 30, 2020

Malware Prevention 2020: Expert Predictions and How to Prepare

Every year, as the cybersecurity requirements of businesses become more complex, technology continues to evolve to meet them. Although new Internet of Things (IoT) devices and cloud-based systems are helping companies run more efficiently, they can also pose significant cybersecurity risks. Cyber risks will continue to grow throughout the next year and enterprises need to ensure that they have a comprehensive suite of products to protect all of their devices and systems from the newest threats.

Various endpoints on top of servers protected by a cybersecurity shield
March 16, 2020

The Biggest Advances in Cybersecurity Technology in 2019

Every year, the cyber attack vector continues to grow, bringing about new threats and concerns. The ever-evolving cybercrime landscape means security systems, technologies and processes require continuous modernization to keep up. Fortunately, cybersecurity companies are updating their technologies to help match the threat landscape, and 2019 was one of the best years on record for cybersecurity innovation. Here are some of 2019’s best cyber advances that will help companies implement stronger malware detection, endpoint security and other types of threat protection.

Two sandboxes for testing code. One with bugs to show bad code and one without any bugs
March 02, 2020

The Differences Between Sandbox and Honeypot Security Technology

When it comes to cybersecurity, different tactics emerge on a daily basis, which can make it difficult to keep up with current trends. Sandboxing and honeypot security are two cybersecurity tactics that are constantly evolving but can be confused. These two technologies are quite different and both offer valuable solutions to various cybersecurity issues. By understanding the differences in these two technologies, businesses can be sure they have the right solution for their cybersecurity needs.

A hacker attempting to break into various devices. The devices protected by a shield are not infiltrated but the unprotected server has been hacked
February 17, 2020

Why Every Enterprise Needs Honeypot Security

Cyber attacks have been on the rise for the past five years and traditional, passive defenses are no longer enough to protect businesses and enterprises. Many companies are pairing defensive and offensive cybersecurity approaches and are implementing measures like honeypots and deception technologies to protect against future attacks.

A hacker attempting to break into two servers, one of which is protected by RevBits Deception Technology and what that isn't.
February 03, 2020

How to Get the Most Out of Honeypot and Deception Technology

Cyber attacks have been on the rise for the past five years and are projected to occur every 11 seconds by 2021. The frequency and sophistication of new-age cyber attacks means cybersecurity efforts need to extend beyond traditional defense methods. As more entities implement offensive cybersecurity, global spending on cybersecurity is expected to reach $133.7 billion in 2022. As a part of these offensive cybersecurity efforts, many companies are implementing proactive measures such as honeypots and deception technology to protect from attack.

Two laptops back to back. One is red to show a hacker and one is green to show a normal laptop.
January 20, 2020

Lookalike Login Pages Pose a Serious Cyber Risk

Although email phishing has taken many forms throughout the years, the most common type of email scam is also the oldest. Since 2003, black-hat hackers have created domain names and web pages that look virtually identical to actual websites and have linked these copycat sites to vulnerable users via emails. It is increasingly difficult to tell the difference between a real web page and a fake one, especially for companies without sophisticated anti-phishing tools. For all companies, it's important to have the best anti-phishing solutions in place to ensure all data is protected and downtime is avoided.

Malicious cloud hovering over endpoints
January 06, 2020

5 Ways Cloud-Based Endpoint Security Services Pose a Threat Businesses

In today’s age of digital evolution, businesses have more and more endpoints to protect. It is increasingly important for enterprises to have the right endpoint security to assist with malware detection and ransomware detection. While many vendors offer different types of solutions to help mitigate suspicious endpoint activity, cloud-based endpoint security services are becoming increasingly popular. However, there are many risks in using cloud-based services.

Laptop with a fish hook
December 23, 2019

How to Stop Phishing Attacks

Have you ever received an email that looks totally legitimate, links to a website that looks real, and asks for personal information? It is becoming harder and harder to know who and what can be trusted. Phishing is the practice of trying to get an unsuspecting email user to engage with an email in some way (opening, clicking, downloading an attachment, sending money, etc.).

Newsletter Signup