Ransomware resiliency for storage and backup: trends, threats and tips
Ransomware has evolved into a fully-fledged industry, with competing groups that continually introduce new capabilities and techniques.
Home | Strategies | Page 6
Ransomware has evolved into a fully-fledged industry, with competing groups that continually introduce new capabilities and techniques.
At Black Hat 25, Omdia Senior Principal Analyst Rik Turner spoke on zero trust and its place in the current landscape.
How SBOMs can help protect the supply chain and why things are likely to get worse before they get better.
At Black Hat, Kyle Tobener discusses harm reduction, reviews the research and proposes a framework for applying it to cybersecurity risks.
Chris Krebs looks back at the first 25 years of Black Hat and attempts to gauge where the industry is going in the next 25.
ICS Insights It is crucial to have proper cybersecurity when it comes to industrial control systems. The ICS periodic table provides insights on the best practices of industrial cybersecurity on industrial control systems. It is […]
Cybersecurity Insights As automation has become a regular feature of food processing facilities, the necessity for proper cybersecurity measures is more important than ever. It’s important to develop and implement a security awareness program, set […]
As an extra layer of security, several online services have adopted push notification-based two-factor authentication systems, whereby users must approve login attempts through a mobile device. In current authentication systems, especially the “tap to approve” […]
As the nature of digital warfare evolves, the need for a workforce trained in cybersecurity is critical for defending the United States from attacks. In response to the growing threat and the need for talent, […]
The CU Boulder-led initiative—MATCH, or Multi-tier Assistance, Training and Computational Help—is part of a larger program called Advanced Cyberinfrastructure Coordination Ecosystem: Services and Support (ACCESS). ACCESS is replacing the Extreme Science and Engineering Discovery Environment […]
Ransomware has evolved into a fully-fledged industry, with competing groups that continually introduce new capabilities and techniques.
At Black Hat 25, Omdia Senior Principal Analyst Rik Turner spoke on zero trust and its place in the current landscape.
How SBOMs can help protect the supply chain and why things are likely to get worse before they get better.
At Black Hat, Kyle Tobener discusses harm reduction, reviews the research and proposes a framework for applying it to cybersecurity risks.
Chris Krebs looks back at the first 25 years of Black Hat and attempts to gauge where the industry is going in the next 25.
ICS Insights It is crucial to have proper cybersecurity when it comes to industrial control systems. The ICS periodic table provides insights on the best practices of industrial cybersecurity on industrial control systems. It is […]
Cybersecurity Insights As automation has become a regular feature of food processing facilities, the necessity for proper cybersecurity measures is more important than ever. It’s important to develop and implement a security awareness program, set […]
As an extra layer of security, several online services have adopted push notification-based two-factor authentication systems, whereby users must approve login attempts through a mobile device. In current authentication systems, especially the “tap to approve” […]
As the nature of digital warfare evolves, the need for a workforce trained in cybersecurity is critical for defending the United States from attacks. In response to the growing threat and the need for talent, […]
The CU Boulder-led initiative—MATCH, or Multi-tier Assistance, Training and Computational Help—is part of a larger program called Advanced Cyberinfrastructure Coordination Ecosystem: Services and Support (ACCESS). ACCESS is replacing the Extreme Science and Engineering Discovery Environment […]
Keep your finger on the pulse of top industry news
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.