Cybersecurity for Oil and Gas: An Overview
The growing value of business data, the vulnerability of networked systems, and the importance of fuel infrastructure have made oil and gas companies major targets for malicious hackers. Already, the industry has ...
The Fight Against Ransomware Calls For a New Backup Strategy
The Fight Against Ransomware Calls For a New Backup Strategy michelle Tue, 11/02/2021 - 09:39 Once-a- day backups leave a whole day’s worth of transactions unprotected. In the digital economy, losing such ...
A Brief History of Ransomware Evolution
Wondering where the scourge of ransomware attacks currently stands? In a recent report titled Ransomware: The True Cost to Business, we noted that ransomware attacks occur about every 11 seconds. That rate ...
Cyberattacks in 2021 Highlighted Critical Infrastructure Risks
Concerns regarding cyberattacks against critical infrastructure have elevated industrial control systems (ICS) security to a mainstream topic. The first half of the year saw an increase in vulnerabilities found in ICS, exposing ...
Is Ransomware a Technology Pandemic in the Making?
Ten years ago, ransomware attacks were inconvenient. But today, they present an apocalyptic national security threat capable of crippling infrastructure that the population depends on. “No one country, no one group, can ...
Protecting Your Enterprise from Ransomware with MixMode
Monthly reports that lack relevant details about an organization’s true risk level are insufficient and not representative of the further steps an organization should take to protect itself. This approach leaves organizations ...
Effective software security activities for managing supply chain risks
BSIMM12 reports increased attention on software security due to recent supply chain disruptions. Get recommendations for managing supply chain risks. The post Effective software security activities for managing supply chain risks appeared ...
Protecting Critical Infrastructure with Automation and Zero-Trust
Politicians on the Homeland Security Committee have recently presented a bill for review which would require critical infrastructure organizations to report data breaches and ransomware payments to the federal government. This comes ...
Useful Tips for Choosing a Cloud Security Vendor
A guide for what to take into account when starting to evaluate cloud security solutions. What to consider, how to determine value and how to navigate between capabilities and your needs. The ...
Predictive Ransomware Protection: The Key to Ending a Global Crisis
Successful ransomware attacks take time. They involve gaining a foothold in the enterprise, conducting reconnaissance, escalating privileges, and then locating and exfiltrating your organization’s most sensitive data. The entire process, up until ...