Stories from the Field – Kaseya REvil Ransomware Attacks
Welcome back to our Stories from the Field series, where we share info on how our Insider Threat analysts work with customers to proactively defend their environments against emerging threats. In this ...
Get an Inside Look at the Gradient Leg Up ‘21 Virtual Event
As the “new normal” takes hold, MSPs must prepare to meet the demands and requirements of their clients and captureRead More The post Get an Inside Look at the Gradient Leg Up ...
Top SEO Best Practices for MSPs
Search Engine Optimization (SEO) is one of the best techniques for managed service providers (MSPs), like you, to gain newRead More The post Top SEO Best Practices for MSPs appeared first on ...
Supply Chain Shock: Realities About the Security of the Software Supply Chain
News reports on attacks on the “supply chain” are becoming an almost every-day occurrence. First there was SolarWinds, then Kayesa, followed by countless other large and small supply chain attacks. Global businesses, ...
Attack Vectors: How They Can Harm Your Company
Over the last few years, we have grown accustomed to hearing about cybersecurity incidents affecting companies of all scales andRead More The post Attack Vectors: How They Can Harm Your Company appeared ...
Sitdown With a SOC Star: 11 Questions With Recon InfoSec’s Andrew Cook
Andrew Cook, security operations director at Recon Infosec, is next to take the hot seat for our ongoing “Sitdown With... The post Sitdown With a SOC Star: 11 Questions With Recon InfoSec’s ...
SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)
As readers of the AppSec Observer blog are aware, application attacks have continued unabated throughout the massive economic and social changes of the past two years. Most readers are also aware that ...
Ransomware attackers down shift to ‘Mid-Game’ hunting in Q3 2021
Ransomware attacks continued to proliferate in Q3 as governments and law enforcement ratchet up the pressure of the cyber extortion economy ...
Walking the Data Security vs Data Privacy Tightrope
Protecting personal, sensitive information from falling into the wrong hands is increasingly one of the top reasons SMBs turn toRead More The post Walking the Data Security vs Data Privacy Tightrope appeared ...
IT Budgeting: Tips and Best Practices for IT Professionals
What Is IT Budgeting? IT budgeting is the process of allocating money to be spent on an organization’s IT systemsRead More The post IT Budgeting: Tips and Best Practices for IT Professionals ...