|
Blog
|
Cybersecurity
|
Page
|
2

Cyber Attackers Hope to Upstage Athletes with Olympic-Sized Hack

Arraya Insights| February 21, 2018

The Olympics provide the world’s best athletes with an incomparable platform upon which to show off their skills and, this year, they’ve proven an irresistible target for hackers eager to do the same. In fact, according to new evidence, the efforts to hack the Pyeongchang games were ramping up long before the first medal was […]

Read More >

‘Heroic’ NotPetya Recovery and the Case for Prevention Over Cures

Arraya Insights| February 6, 2018

New details have emerged concerning one company’s efforts to recover from last summer’s NotPetya attacks and they definitely call to mind that old cliché about an ounce of prevention equaling a pound of cure. Maersk, the world’s largest shipping company, was one of many organizations that fell victim to the outbreak, which initially appeared to […]

Read More >

Get Your Data Under Control With Varonis DataAdvantage

Arraya Insights| November 13, 2017

I spend a lot of time with customers talking about network security, endpoint security, monitoring, and a whole host of other security solutions that are highly technical and point to specific risks. We get so caught up in the technologies that process the data, that we rarely look at the data itself. Specifically, I’m talking about […]

Read More >

All CEOs Should Pay Attention to Equifax Firings – They May Be Next

Arraya Insights| September 19, 2017

Nobody was surprised when it was announced this weekend that the chief information officer and chief security officer were both out at Equifax. We all knew that was going to happen because those two roles always get terminated after a major breach. Clearly, it’s always the CIO and CSO’s fault, right…or is it? I’ve never […]

Read More >

What the Equifax Breach Means for the Future of Securing Sensitive Data

Arraya Insights| September 12, 2017

There’s really no nice way to say it, what happened at Equifax last week was the biggest failure to safeguard public data to date. Yahoo had more records compromised, but those weren’t nearly as sensitive.  Furthermore, Equifax’s response has been characterized by Brian Krebs, a leading security expert, as a “dumpster fire.” Krebs goes on […]

Read More >

5 Sneaky Security Trends That Demand IT's Attention

Arraya Insights| September 8, 2017

There’s a positive moment at the top of Cisco’s 2017 Midyear Cybersecurity Report, one which acknowledges the advances security pros have made regarding preventing and recovering from attacks. Unfortunately – and predictably – this new report isn’t all pats on the back. Instead, the conversation shifts to a number of trends observed by Cisco, each […]

Read More >

How This NY Law Could Change the Cyber Security Game

Arraya Insights| September 1, 2017

On Monday August 28th, the 180-day transitional period for compliance with the New York Department of Financial Services Cyber Security Law came to an end. This means that covered entities are now required to be in compliance with elements of the law unless otherwise specified. The date is significant because companies affected by the law […]

Read More >

What the Feds' Healthcare Security Moves Mean For the Rest of Us

Arraya Insights| July 21, 2017

The healthcare industry is under cyber assault.  Few industries have been impacted by recent security incidents quite like healthcare companies.  In May, WannaCry shut down emergency rooms and other medical services for 16 National Health System facilities in the U.K.  Last month, the drug manufacturer Merck experienced a ransomware attack that affected all of their offices […]

Read More >

Shining a Light on Shadow IT and Taking Back Control of the Cloud

Arraya Insights| July 11, 2017

In the beginning there was the firewall . . . Several years back, organizations did not even think about users signing up for their own applications. This is because each application required access to resources that were beyond their control. Storage, compute, and network configurations were all IT’s domain and so IT needed to be […]

North Korea, Russia and Their Effect on Your Cyber Security

Arraya Insights| July 5, 2017

Names like “Sandworm” and “Hidden Cobra” may sound as though they were pulled from the pages of an epic sci-fi novel, however, the threats they pose are very real. These fantastical monikers actually refer to a pair of shadowy – and allegedly state-sponsored – global cybercrime initiatives. Upon closer inspection, the tactics and endgames employed […]