Search
Close this search box.

Networks

Minimizing the REvil impact delivered via Kaseya servers

Minimizing the REvil impact delivered via Kaseya servers

As the USA prepared for a holiday weekend ahead of the Fourth of July, the ransomware group REvil was leveraging a vulnerability in Kaseya software to attack managed service providers (MSPs) and their downstream customers. […]

The key elements of cybersecurity management are strategy, operational excellence and organizational engagement. Courtesy: Meditechsafe

Three ways to ensure and optimize cybersecurity maturity

The closing months of 2020 saw a 45% increase in cyber-attacks targeted towards healthcare organizations. Healthcare providers of all types and sizes have been breached. A report by Black Book Market Research predicts that data […]

Egregor ransomware: Gone but not forgotten

Egregor ransomware: Gone but not forgotten

Ransomware groups are coming and going faster than ever. In June alone, we saw Avaddon release its decryption keys unprompted and disappear from sight, while members of CLOP were arrested in Ukraine. The move follows […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Three benefits of a 360-degree vulnerability assessment

Defending critical infrastructure environments requires 360-degree visibility into asset and network vulnerabilities, which is why a vulnerability assessment is so important. Vulnerability management teams often face difficulties in patching all of their systems on a […]

Image courtesy: Brett Sayles

How the remote workforce has changed data security

As we made an almost overnight move to a remote workforce as a result of the pandemic, we have increased data security risks and new risks for data exfiltration. The result of this is inevitable […]

Minimizing the REvil impact delivered via Kaseya servers

Minimizing the REvil impact delivered via Kaseya servers

As the USA prepared for a holiday weekend ahead of the Fourth of July, the ransomware group REvil was leveraging a vulnerability in Kaseya software to attack managed service providers (MSPs) and their downstream customers. […]

The key elements of cybersecurity management are strategy, operational excellence and organizational engagement. Courtesy: Meditechsafe

Three ways to ensure and optimize cybersecurity maturity

The closing months of 2020 saw a 45% increase in cyber-attacks targeted towards healthcare organizations. Healthcare providers of all types and sizes have been breached. A report by Black Book Market Research predicts that data […]

Egregor ransomware: Gone but not forgotten

Egregor ransomware: Gone but not forgotten

Ransomware groups are coming and going faster than ever. In June alone, we saw Avaddon release its decryption keys unprompted and disappear from sight, while members of CLOP were arrested in Ukraine. The move follows […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Three benefits of a 360-degree vulnerability assessment

Defending critical infrastructure environments requires 360-degree visibility into asset and network vulnerabilities, which is why a vulnerability assessment is so important. Vulnerability management teams often face difficulties in patching all of their systems on a […]

Image courtesy: Brett Sayles

How the remote workforce has changed data security

As we made an almost overnight move to a remote workforce as a result of the pandemic, we have increased data security risks and new risks for data exfiltration. The result of this is inevitable […]

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES