Cyber Insurance Gap May Leave Merck Hanging After NotPetya

During the summer of 2017, pharmaceutical giant Merck was one of countless companies, around the world hit by the most devastating cyber-attack in history: NotPetya. Initially masquerading as ransomware, NotPetya turned out to be far worse: a strain of malware designed to destroy systems rather than hold them hostage. The toll NotPetya inflicted on Merck […]
3 Factors (Besides Budget) That Promote Cyber Security Success

Here’s something we can all be thankful for this holiday season: Larger cyber security budgets are reportedly on their way! In a recent FireEye study, 76% of participants said they expect their security budgets to increase in 2020. That’s obviously encouraging for those fighting the good fight and bad news for those on the other […]
Arraya Insights Radio: Cyber Security 2020: Refocusing for the New Year

Arraya Insights Radio Episode 17: Cyber Security 2020: Refocusing for the New Year Cyber Security was a hot topic all year long and next year promises to be more of the same. More of the same, but also different. On this episode of Arraya Insights Radio, Thomas York, Senior Director of IT Operations, welcomes a […]
8 Cyber Security Blind Spots that Could Cost SMBs Big

No entity, no matter the size, can afford cyber security blind spots. The recent string of ransomware attacks targeting local governments has underscored that point. Hackers have gone after major cities like Baltimore and they’ve hit places the average person is less familiar with, like Lake City, FL. Despite the risks, many small-to-midsized municipalities, businesses, […]
Safety in the Cloud with Dell EMC Data Protection for VMC on AWS

Back in the spring, we wrapped up a months-long deep dive into the features and benefits of VMC on AWS. Along the way, we covered NSX integration and native tools, as well as the solution’s ability to power migration simplification and disaster recovery. However, a topic came up at our recent Arraya Solutions Tech Summit […]
When to Trust in TACACS+: 3 Use Cases

These days, everybody is looking for a cyber security silver bullet. Organizations want something flashy, new, and most importantly, capable of besting any threat or malicious actor that may cross its path. TACACS+ is none of those things. In truth, that perfect cyber security cure-all may never materialize. Instead, the most successful security postures use […]
Keeping Your Organization Safe with Password Management and DUO 2FA

Most cybersecurity experts will advise employees to keep their personal information off their company-issued devices. In fact, most companies’ acceptable use policies require it. Yet, despite the ample warnings and policies, employees continue to use their work devices for decidedly non-work purposes. With the growing popularity of remote working, road-warriors, bring your own device (BYOD), […]
Citrix, Equifax, and How to Data Breach-Proof Your Business

Last week, Citrix became the latest victim of a high-profile data breach while Equifax, a perennial cyber security punching bag, was raked over the coals by Congress. Both stories represent valuable learning opportunities for organizations seeking to avoid a similar fate. Let’s review each story, then we’ll share some insights into how companies can protect […]
3 Standout New Features in Cisco's Firepower 6.3 Release

Cisco recently released version 6.3, the latest iteration of software powering its Firepower family of cyber security solutions. Included as part of this update are several features that have long sat atop the wish lists of Cisco security shops. We caught up with members of our Network and Security team to learn more about what’s […]
6 Security Lessons Learned from Marriott’s Massive Data Breach

Last week, buried predictably on a Friday, Marriott revealed it – and, by extension, its guests, had been the victim of a truly massive data breach. All told, the hospitality giant believes attackers gained access to data on some 500 million guests who stayed at its Starwood properties over the past four years. For roughly 327 […]