|
Blog
|
Security
|
Page
|
6

All CEOs Should Pay Attention to Equifax Firings – They May Be Next

Arraya Insights| September 19, 2017

Nobody was surprised when it was announced this weekend that the chief information officer and chief security officer were both out at Equifax. We all knew that was going to happen because those two roles always get terminated after a major breach. Clearly, it’s always the CIO and CSO’s fault, right…or is it? I’ve never […]

Read More >

What the Equifax Breach Means for the Future of Securing Sensitive Data

Arraya Insights| September 12, 2017

There’s really no nice way to say it, what happened at Equifax last week was the biggest failure to safeguard public data to date. Yahoo had more records compromised, but those weren’t nearly as sensitive.  Furthermore, Equifax’s response has been characterized by Brian Krebs, a leading security expert, as a “dumpster fire.” Krebs goes on […]

Read More >

5 Sneaky Security Trends That Demand IT's Attention

Arraya Insights| September 8, 2017

There’s a positive moment at the top of Cisco’s 2017 Midyear Cybersecurity Report, one which acknowledges the advances security pros have made regarding preventing and recovering from attacks. Unfortunately – and predictably – this new report isn’t all pats on the back. Instead, the conversation shifts to a number of trends observed by Cisco, each […]

Read More >

How This NY Law Could Change the Cyber Security Game

Arraya Insights| September 1, 2017

On Monday August 28th, the 180-day transitional period for compliance with the New York Department of Financial Services Cyber Security Law came to an end. This means that covered entities are now required to be in compliance with elements of the law unless otherwise specified. The date is significant because companies affected by the law […]

Read More >

VMworld 2017 Day 1 Recap

Arraya Insights| August 29, 2017

VMworld 2017 kicked off yesterday morning in Las Vegas with the usual flurry of VMware news and announcements. Some of the biggest stories to break during day one of the conference pertained to perennial IT talking points like the cloud and cyber security. If you couldn’t make it out to take in these updates in […]

Read More >

Looking at the How and Why of Windows 10 Migrations

Arraya Insights| August 10, 2017

Drama-free has been a good way to describe the list of the world’s most used operating systems over the last several years. The most recent figures have Windows 7 comfortably in the top spot with just over 49% of the desktop market, according to research conducted by NetMarketShare. This is a position Windows 7 has […]

Victim No More: Put Your Data Out of Ransomware’s Reach

Arraya Insights| July 31, 2017

  Now that the dust has settled on Petya (NotPetya, etc.), businesses and countries are attempting to come to terms with the malware outbreak, which began in Ukraine before spreading to an estimated 65 countries globally. Petya was initially believed to be a ransomware campaign similar to WannaCry. However, security experts later came to see […]

What the Feds' Healthcare Security Moves Mean For the Rest of Us

Arraya Insights| July 21, 2017

The healthcare industry is under cyber assault.  Few industries have been impacted by recent security incidents quite like healthcare companies.  In May, WannaCry shut down emergency rooms and other medical services for 16 National Health System facilities in the U.K.  Last month, the drug manufacturer Merck experienced a ransomware attack that affected all of their offices […]

Read More >

10 Ways You May Not Be Using Log Analytics (But Should Be)

Arraya Insights| July 19, 2017

Not seeing a problem isn’t the same as not having a problem. Hackers and bad actors have gotten very good at carrying out their crimes without arousing suspicion. As such, malicious activity can go on for months or even longer without drawing attention to itself. By the time someone does notice – or the attackers […]

Read More >

Shining a Light on Shadow IT and Taking Back Control of the Cloud

Arraya Insights| July 11, 2017

In the beginning there was the firewall . . . Several years back, organizations did not even think about users signing up for their own applications. This is because each application required access to resources that were beyond their control. Storage, compute, and network configurations were all IT’s domain and so IT needed to be […]