Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Comments Off on CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

Should We Be Worried About Vehicle Hacking?

And what can we do about it? By Martin Banks With more connected devices than ever, cybersecurity is a more prominent issue today than ever before. You’ll see articles and…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , | Comments Off on Should We Be Worried About Vehicle Hacking?

How To Fight A Virus: Lessons From Cybersecurity

By Yotam Gutman, SentinelOne There has been a great deal of conversation around the similarities between the spread of the Covid-19 virus and that of computer viruses. And indeed, as…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Comments Off on How To Fight A Virus: Lessons From Cybersecurity

IOT Security Embedded in Memory Cards

AS DEVICES, MACHINERY AND MANUFACTURING PLANTS GET SMARTER, THEY ALSO BECOME MORE VULNERABLE. By Hubertus Grobbel, Vice President Security Solutions, Swissbit. When designing networked devices, machinery, and production facilities, developers…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on IOT Security Embedded in Memory Cards

Managing Small Business Cybersecurity During Covid-19

By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Managing Small Business Cybersecurity During Covid-19

Mitigating Against Ransomware: Don’t Let Backups Be the Back Door

By Rick Vanover, Senior Director, Product Strategy, Veeam The damage ransomware can inflict on businesses is staggering. For businesses who feel they have no choice but to pay cybercriminals in…

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on Mitigating Against Ransomware: Don’t Let Backups Be the Back Door

The Devil Inside

Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on The Devil Inside

Cyber Crime is Paying

What the Evolution of Ransomware Means for the Security Industry By Ricardo Arroyo, Senior Technical Product Manager, WatchGuard Technologies If you were talking to a retired police officer or FBI…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Cyber Crime is Paying

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X