Ransomware isn’t Going Away - Make it Less of a Threat with Dell EMC PowerProtect Cyber Recovery

If there’s one technology topic most of us probably would have liked to leave back in 2020, it’s ransomware. Given how lucrative the technology has become, it’s doubtful cyber criminals will be open to the idea of letting it fade from headlines anytime soon. Whether they’re able to keep up last year’s pace, in which […]
Sunburst/Solorigate Aftermath: 4 Lessons Learned from the SolarWinds Breach

Organizations everywhere are only just beginning to come to terms with the Sunburst/Solorigate compromise. Even at this stage, it’s clear the backdoor into SolarWinds’ Orion network monitoring and management platform represents one of the most substantial cyber security breaches in recent memory. SolarWinds’ client list reads like a who’s who of the public and private […]
2 Ways Attackers Have Tweaked Ransomware to Make it Even More Effective

The ransomware playbook used to be fairly straightforward. Attackers would gain access to an organization’s data, lock it down, make their demands, and then wait to see if the bitcoin would roll in. And roll in it did. Ransomware has become a multi-billion dollar industry, one with an alarmingly low barrier to entry thanks to […]
Planning to Roll Out a SIEM? Do These 3 Things First

So, you’ve decided to invest in a SIEM. Maybe you’ve even chosen the one that seems to be the best fit for your organization’s needs. Soon, your security team will be awash in data, with real time insights coming in to one central hub from across your environment. Hackers and any other malicious actors will […]
How to Address Security Compliance Shortfalls Using the CIS Top 20 (Part 2: Foundational Controls)

Security and compliance may not be one and the same, however, the Center for Internet Security (CIS) Top 20 Controls can substantially help organizations achieve both. Strict adherence to CIS’s nearly two dozen cyber security best practices can help organizations ready their defenses for the worst today’s cyber criminals can muster. Additionally, the controls can […]
How to Address Security Compliance Shortfalls Using the CIS Top 20 (Part 1: Basic Controls)

Those in fields such as healthcare and financial services are no strangers to finding ways to live in harmony with data privacy and cyber security regulations. However, with the passage of statutes like GDPR and the California Consumer Privacy Act, those headaches are now being felt more acutely across all industries. What’s more, they’re also […]
Verizon’s Business 2020 Data Breach Investigations Report: 7 Insights for CISOs

Now in its 13th year, the Verizon Business Data Breach Investigations Report has become an annual repository of data points showcasing what’s working (and what isn’t) for cyber criminals and those who oppose them. This time, Verizon’s research team began with a global pool of nearly 160,000 suspected security incidents, distilling them down into the […]
9 Revealing Stats from Cisco’s 2020 CISO Benchmark Study

Looking for some insight into what your peers are doing (and seeing) as they work to keep their own organizations secure? One resource worth checking out is Cisco’s 2020 CISO Benchmark Study. In compiling this incarnation of its yearly tradition, Cisco crowd-sourced the knowledge and experiences of more than 2,800 technology decision-makers from around the […]
Critical vCenter Server 6.7 Bug You Need to Patch ASAP

It can be tough to keep up with applying patches under normal circumstances and the last few weeks have certainly been anything but normal. However, if you use vCenter Server 6.7 (with embedded or external platform services controller [PSC]) to help manage your organization’s data center, you’ll want patching at the top of your team’s […]
Coronavirus Scams: 9 Keys to Protecting Your Organization and Users

Cyber scammers love a crisis and the current coronavirus outbreak is no exception. As employers and employees alike struggle to find their way in this new (and hopefully short-lived) reality, criminals are finding that business is booming. Fear and uncertainty are tools of their trade and both are, sadly, in ample supply. Compounding the problem […]