Stu Sjouwerman Stu Sjouwerman is founder and CEO of KnowBe4, developer of security awareness training and simulated phishing platforms, with over 30,000 customers and more than 20 million users. He was co-founder of Sunbelt Software, a multiple award-winning anti-malware software company that was acquired 2010. Stu is the author of four books, with his latest being “Cyberheist: The Biggest Financial Threat Facing American Businesses.”

Stu Sjouwerman

Why Are So Many Public Sector Organizations Getting Attacked?
Public sector organizations such as schools, hospitals, manufacturing units, essential services and government offices have become a popular target for cybercriminals ... Read More
Security Boulevard

Credential Harvesting Vs. Credential Stuffing Attacks: What’s the Difference?
Credential stuffing and harvesting, although similar, have nuanced differences particularly in how credentials are stolen, acquired and used ... Read More
Security Boulevard

How to Know if You’ve Been Infected by Ransomware
Stu Sjouwerman | | Cybersecurity, EDR, Process Explorer, Ransomware, VirusTotal, Windows Defender Application Control, wiper malware
Detecting ransomware activity has become increasingly difficult because adversaries are constantly evolving their tools, tactics and techniques. For example, threat actors are using new programming languages like Rust to help avoid detection by security software and exfiltrating data (instead of encrypting it) so they can threaten organizations that use backups ... Read More
Security Boulevard

Why Secure Email Gateways Fall Short
Secure email gateways (SEGs) have been around for more than a decade. They’re one of the most common types of email security solutions deployed on the perimeter to protect incoming and outgoing mail as well as filter out spam, phishing and other email-based malware from reaching email inboxes. However, studies ... Read More
Security Boulevard

MFA Adoption is Improving, but Cybercriminals are Keeping Up
While multifactor authentication has historically been hailed as one of the most significant forms of defense against attacks that leverage compromised credentials, the reality is far from it. MFA attacks are in fact gaining popularity—in the first 90 days of 2022, researchers noted a staggering 113 million attacks against MFA, ... Read More
Security Boulevard

Before the Ransomware Attack: 5 Initial Access Methods
Stu Sjouwerman | | attackers, Cybersecurity, Initial Access Brokers, Phishing, protection, Ransomware
Most security teams will agree that having a deep understanding of how attackers gain initial access is the most critical factor in building an effective cybersecurity strategy and stopping ransomware attacks in their tracks. According to federal research by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), attackers infiltrate victim ... Read More
Security Boulevard

3 Key Elements of a Data Protection Impact Assessment
Data generated by consumers is used by interested parties to better understand customer behaviors—their likes, dislikes, interests, demographics, location and activities—for the purpose of developing or targeting products, improving engagement and personalizing services at an unprecedented scale. The value of this data, therefore, continues to rise exponentially. But with an ... Read More
Security Boulevard

How to Mitigate the Top 4 Ransomware Vectors
The ransomware economy is booming. Ransomware gangs are so successful that if cybercriminals were companies, some would be considered “unicorns.” Organized crime syndicates have taken over this highly lucrative extortion racket and are now running the ransomware economy at an industrial scale. The U.S. is reportedly hit by seven ransomware ... Read More
Security Boulevard

How to Forensically Examine Phishing Emails
Learn about the warning signs that can help you identify phishing and how to confirm your suspicions with a forensic examination of the email header In the fight to safeguard data, one of the biggest risks facing organizations of all sizes is phishing emails. Data breaches, identity theft and fraud ... Read More
Security Boulevard