VMware Flaw a Vector in SolarWinds Breach?

VMware Flaw a Vector in SolarWinds Breach?

U.S. government cybersecurity agencies warned this week that the attackers behind the widespread hacking spree stemming from the compromise at network software firm SolarWinds used weaknesses in other, non-SolarWinds products to attack ...
Five worthy reads: Decision intelligence for critical business moments

Five worthy reads: Decision intelligence for critical business moments

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore decision intelligence. AI and analytics are playing critical ...
SolarWinds

The SolarWinds Supply Chain Hack: What You Need to Know

Just when you thought we had the last major hack of 2020 with the FireEye incident last week, we have discovered just a couple of days later that it stemmed from a ...
Security Boulevard
Did You Know? In 2021, a cyber attack is expected to occur every 11 seconds!

Cybercrime Expected to Rise At an Unprecedented Rate in 2021

  As the organizations around the world continue to trudge through the disruption caused by the COVID-19 pandemic, cybercriminals keepContinue reading The post Cybercrime Expected to Rise At an Unprecedented Rate in ...

Could Universities’ Use of Surveillance Software Be Putting Students at Risk?

Life for university students has changed massively during the coronavirus pandemic, as it has for all of us. While some in-person lectures and seminars are still taking place, there has been a ...
Malicious Domain in SolarWinds Hack Turned into ‘Killswitch’

Malicious Domain in SolarWinds Hack Turned into ‘Killswitch’

A key malicious domain name used to control potentially thousands of computer systems compromised via the months-long breach at network monitoring software vendor SolarWinds was commandeered by security experts and used as ...

Russian Hack of U.S. Federal Agencies Shine Spotlight on SIEM Failures in Cybersecurity

In what the New York Times is calling, “One of the most sophisticated and perhaps largest hacks in more than five years,” malicious adversaries acting on behalf of a foreign government, likely ...
A data retention policy graphic showing 3 file folders with hour glasses and a trash can.

Data Retention Policy: What It Is and How to Create One

A data retention policy guides what data should be stored or archived, where that should happen and for how long. Download a free data retention template to get started ...

A Company Culture of Data Privacy – Your Role as a Data Caretaker

The big cloud service providers—think Amazon Web Services, Microsoft, and Google—are very clear about the shared responsibility model. If you distill out of it all the nuances and variables, this model comes ...