Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help
By Sam Hutton, SVP, Glasswall As ransomware attacks, insider threats, data breaches and phishing attacks against government agencies continue to skyrocket, organisations are at constant risk. There are many recent…
Why Building Managers Need to Prioritize Cybersecurity
By Shaun Cooley, Founder and CEO of Mapped In an age increasingly dominated by the internet of Things (IoT), buildings have become elaborate networks of software and hardware designed to…
Detect Ransomware Data Exfiltration Immediately
By Randy Reiter CEO of Don’t Be Breached Ransomeware Attacks Have Increased During the COVID-19 Pandemic An off-site workforce has resulted in new security concerns since hackers now have many…
Responding To the Ransomware Pandemic
By Tom McVey, Solution Architect, Menlo Security Last year, Kaseya became the victim of the largest ransomware attack in history when Russian-linked hacker group REvil breached the US software company’s…
Today’s Digital Battlefield Demands Resilience Beyond Infrastructure
By Mohammed Al Mohtadi, Cyber Information Security Officer, Injazat There is a battle underway globally that requires every business to identify their risks of attack, fortify their defences, and continually…
How To Improve Federal Endpoint Detection and Response Tactics and Gain Network Visibility
By Matt Marsden, Vice President, Technical Account Management, Federal, Tanium Endpoint detection and response (EDR) was put on center-stage when the Office of Management and Budget (OMB) released a memo requiring that agencies must collaborate…
Cybersecurity Experts Share Their Predictions for 2022
By Danny Lopez, CEO of Glasswall The year 2021 raised many major cybersecurity concerns including the rise in ransomware attacks, phishing scams, and data breaches. Many organizations have embraced a…
Three Key Facts About AI-Driven Network Detection and Response
By Eyal Elyashiv, CEO, Cynamics Most network detection and response solutions and network performance monitoring and diagnostic tools are using the same paradigm that was invented three decades ago. However, networks themselves…
OT/IT Security – Two Sides of the Same Coin
By Sachin Shah, CTO of OT, Armis The distinction between information technology (IT) and operational technology (OT) is rapidly converging as the Industrial Internet of Things (iIoT) – with cross-boundary…
First Steps to Alleviate Long-Term Consequences from A Cyberattack
Brief Guide By Sergey Ozhegov, CEO, SearchInform When a cyberattack occurs it is easy to panic and forget all the steps you have been told to make before. What is…
FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine
While investigating a data breach suffered by a healthcare organization, FBI accidentally revealed that it believes that the HelloKitty ransomware gang operates out of Ukraine. The investigation conducted by FBI…
AbstractEmu, a new Android malware with rooting capabilities
AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security researchers at the Lookout Threat Labs have discovered a new Android malware,…