Search results: Kaseya

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

It was bound to happen: a supply-chain compromise, ala SolarWinds, has been combined with a ransomware assault, akin to Colonial Pipeline, with devasting implications. Related: The targeting of supply chains Last Friday, ...
Three wise monkeys

REvil Makes Monkeys out of Kaseya Customers

Over the long weekend, a huge ransomware attack emerged. Kaseya seems to have been the common component ...
Security Boulevard
zero-trust CISO app monitoring SPA AppSec Application Security Management with Sqreen's Pierre Betouin

CISOs Clamor for Better App Monitoring Tools

In the history of IT security, the sector’s traditional tools and solutions have rarely appeared as inadequate as they do now. Over the past four years, the multitude of ransomware attacks resulted ...
Security Boulevard
financial services data breach ransomware

Cybersecurity Threats Need Fresh Data Recovery Strategies

The information age is a double-edged sword. Advanced technologies are accelerating incredible achievements for businesses and consumers. We are more connected than ever, and those connections are faster and increasingly more immediate ...
Security Boulevard
microsegmentation

Why Microsegmentation is Critical for Securing CI/CD

Modern development environments are characterized by cloud-native technology, microservices architectures and DevOps or DevSecOps teams working in close coordination throughout the development life cycle. The continuous integration/continuous delivery (CI/CD) pipeline is the ...
Security Boulevard
AI, defense, cybersecurity,

Before the Ransomware Attack: 5 Initial Access Methods

Most security teams will agree that having a deep understanding of how attackers gain initial access is the most critical factor in building an effective cybersecurity strategy and stopping ransomware attacks in ...
Security Boulevard
cybersecurity, roles, talent, talent gap, talent certifications training

Fostering the Next Generation of Cybersecurity Talent

A career in cybersecurity guarantees many things: Job stability, competitive compensation and room for growth, just to name a few. Cybersecurity professionals are drawn to the fact that they are part of ...
Security Boulevard
SHARED INTEL: A foolproof consumer’s guide to creating and managing bulletproof passwords

SHARED INTEL: A foolproof consumer’s guide to creating and managing bulletproof passwords

It can be a real hassle to keep track of the passwords you use. So many people use the same combination of username and password for every account. However, this isn’t a ...
GUEST ESSAY: Here’s why penetration testing has become a ‘must-have’ security practice

GUEST ESSAY: Here’s why penetration testing has become a ‘must-have’ security practice

A reported loss of $171 Million. Huge sum, right? Related: Supply-chain hacks prove worrisome Yes, and that is what Sony exactly lost when they were hacked and the personal info of every ...
GUEST ESSAY – Here’s how web-scraping proxies preserve anonymity while aiding data access

GUEST ESSAY – Here’s how web-scraping proxies preserve anonymity while aiding data access

Data helps digital businesses make meaningful decisions and fast-track their growth in a global market so that companies that are skilled at harvesting data regularly and consistently tend to grow faster than ...