Search results: Kaseya

Stories from the Field – Kaseya REvil Ransomware Attacks

Welcome back to our Stories from the Field series, where we share info on how our Insider Threat analysts work with customers to proactively defend their environments against emerging threats. In this ...
Leg_Up_Graphic_800x500.png

Get an Inside Look at the Gradient Leg Up ‘21 Virtual Event

| | events, MSP, MSP event
As the “new normal” takes hold, MSPs must prepare to meet the demands and requirements of their clients and captureRead More The post Get an Inside Look at the Gradient Leg Up ...
Top SEO Best Practices for MSPs

Top SEO Best Practices for MSPs

Search Engine Optimization (SEO) is one of the best techniques for managed service providers (MSPs), like you, to gain newRead More The post Top SEO Best Practices for MSPs appeared first on ...

Supply Chain Shock: Realities About the Security of the Software Supply Chain

| | Blog, supply chain
News reports on attacks on the “supply chain” are becoming an almost every-day occurrence. First there was SolarWinds, then Kayesa, followed by countless other large and small supply chain attacks. Global businesses, ...
Alert.jpg

Attack Vectors: How They Can Harm Your Company

Over the last few years, we have grown accustomed to hearing about cybersecurity incidents affecting companies of all scales andRead More The post Attack Vectors: How They Can Harm Your Company appeared ...
Sitdown With a SOC Star: 11 Questions With Recon InfoSec’s Andrew Cook

Sitdown With a SOC Star: 11 Questions With Recon InfoSec’s Andrew Cook

Andrew Cook, security operations director at Recon Infosec, is next to take the hot seat for our ongoing “Sitdown With... The post Sitdown With a SOC Star: 11 Questions With Recon InfoSec’s ...

SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

|
As readers of the AppSec Observer blog are aware, application attacks have continued unabated throughout the massive economic and social changes of the past two years. Most readers are also aware that ...
Ransomware attackers down shift to 'Mid-Game' hunting in Q3 2021

Ransomware attackers down shift to ‘Mid-Game’ hunting in Q3 2021

|
Ransomware attacks continued to proliferate in Q3 as governments and law enforcement ratchet up the pressure of the cyber extortion economy ...
Walking the Data Security vs Data Privacy Tightrope

Walking the Data Security vs Data Privacy Tightrope

Protecting personal, sensitive information from falling into the wrong hands is increasingly one of the top reasons SMBs turn toRead More The post Walking the Data Security vs Data Privacy Tightrope appeared ...
IT Budgeting: Tips and Best Practices for IT Professionals

IT Budgeting: Tips and Best Practices for IT Professionals

| | Budget, IT Budgeting, MSP Tips
What Is IT Budgeting? IT budgeting is the process of allocating money to be spent on an organization’s IT systemsRead More The post IT Budgeting: Tips and Best Practices for IT Professionals ...