Defeat Ransomware with Immutable Backup Data and Encryption
Move beyond traditional security strategies to protect against the two most common types of ransomware threats By Jon Toor, CMO, Cloudian The Director of the FBI recently described ransomware as…
The Biden administration plans to target exchange supporting ransomware operations with sanctions
US Government is expected to issue sanctions against crypto exchanges, wallets, and traders used by ransomware operations to cash out ransom payments. The Biden administration is putting in place all…
New CIOs: 5 Key Steps in Your First 100 Days
Getting the first 100 days right is critical to achieving momentum, credibility, and long-term success. By Etay Maor, Senior Director, Security Strategy, Cato Networks Starting off as a new CIO…
Offense Activities Sharing in Criminal Justice Case
By Milica D. Djekic The criminal justice case could include a broad spectrum of details getting the need to be deeply explored and investigated by the case management team and…
Why Your Hospital Network Needs an IoT Security Policy
By Marc Laliberte, Technical Security Operations Manager, WatchGuard Technologies The Internet of Things (IoT) industry has a security problem that has existed since its inception. From the Mirai botnet that…
TeamTNT cybercrime gang expands its arsenal to target thousands of orgs worldwide
The financially motivated TeamTNT hacking group expanded its arsenal with new tools used to target thousands of victims worldwide. Researchers from AT&T Alien Labs uncovered a new campaign, tracked as Chimaera,…
Considering Collateral Intrusion in Digital Forensics
Achieving A Balance Between Public Protection and Public Privacy By Alan McConnell, Forensic Advisor, Cyan The importance of digital evidence contained on the personal devices of suspects, victims, and witnesses…
Combatting Industry Burnout by Building Resilient Security Teams
By Rick McElroy, Principal Cybersecurity Strategist, VMware We have reached a pivotal point in the history of cybersecurity. Catalyzed by the shift to an anywhere-work environment during COVID-19, attack surfaces…
SEC warns of investment scams related to Hurricane Ida
SEC warns of investment scams related to Hurricane Ida The US Securities and Exchange Commission warns investors of potential investment scams that leverages Hurricane Ida as a bait. The US Securities and Exchange…
Cyber Security Incident Response Plan: How to Proactively Prepare for a Breach
By Joseph Carson, Advisory CISO, ThycoticCentrify Many organizations are coming to the harsh realization that it’s only a matter of when, not if, they will fall victim to a cyberattack….
New Report Reveals Traditional Anti-Malware Solutions Miss 74% of Threats
By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies The threat landscape is an erratic and ever-evolving beast. While it knows no master, its behavior is broadly directed by the host…
How Trustworthy is Your Cyber Defense?
Make your cybersecurity spending pay off with added defense tactics and provider accreditation By Tom Brennan, Chairman, CREST USA Cyber criminals are branching out from the big guys, the Facebook-type…