Leo Versola

For over 25 years, Leo has executed on strategic business vision and technical leadership with a wide range of start-ups and established cybersecurity companies in various senior leadership roles. Leo’s expertise in enterprise, cloud and SaaS security enabled him to build and lead high-performance technical teams driving product development, technical innovation, and sales for a number of companies including VMware, Lastline, Zscaler, Barracuda Networks, Forcepoint, RedSeal Networks, Fortinet, Juniper, and NetScreen.

SEO Poisoning Brings Users to Attackers’ Doors featured image

SEO Poisoning Brings Users to Attackers’ Doors

Using black hat SEO to achieve high rankings for particular search terms, threat actors can sit back as victims flock to their malware-infected websites.

Read More
Don’t Gamble with Your Cybersecurity featured image

Don’t Gamble with Your Cybersecurity

Recent cyberattacks combined stolen credentials, social engineering, MFA resets and SSO manipulation in what’s been described as the Ocean’s 11 of the cyber age.

Read More
Vulnerabilities in Enterprise Apps Earn Most-Favored Status for Cyberattacks featured image

Vulnerabilities in Enterprise Apps Earn Most-Favored Status for Cyberattacks

The recently exposed Microsoft Teams GIFShell technique demonstrates why Zero Trust protection for app surfaces is essential for even the most trusted enterprise apps.

Read More
Weaponized Links and Attachments Being Used to Install Malware featured image

Weaponized Links and Attachments Being Used to Install Malware

Documents with embedded macros are increasingly being used to deliver malware. New Microsoft defaults decrease the danger, but only somewhat, and only for Office docs.

Read More
The Latest Scam: Soliciting Employees to Deploy Ransomware featured image

The Latest Scam: Soliciting Employees to Deploy Ransomware

In a new twist on email-based attacks, cybercriminals are recruiting disgruntled or greedy employees to deploy ransomware in their employers' systems, in exchange for a cut.

Read More
Zero Trust Network Access: A VPN Replacement featured image

Zero Trust Network Access: A VPN Replacement

The time is right for most companies to make the switch to a Zero Trust-based approach as a VPN replacement for enabling remote work.

Read More
Machine Learning in Identity and Access Management featured image

Machine Learning in Identity and Access Management

Take a closer look at how machine learning, a subfield of artificial intelligence, is being deployed in cybersecurity for identity and access management security controls.

Read More