Syndicated Blog - Security Boulevard

Syndicated Blog

Blog ��� AttackIQ

Is Your Healthcare Organization Following These Four Ransomware Best Practices?

Healthcare is the most targeted sector for data breaches, and ransomware attacks were responsible for almost 50 percent of all healthcare data breaches in 2020. How should healthcare companies proceed? Our guest ...
20,000 Strong for AttackIQ Academy. And It’s Just the Beginning.

20,000 Strong for AttackIQ Academy. And It’s Just the Beginning.

| | Blog
With over 20,000 students in AttackIQ Academy, our mission is strong as ever to provide a free education on how to build and implement a threat informed defense. The post 20,000 Strong ...
Azure Security Stack Mappings: The Top Native Security Controls for Ransomware

Azure Security Stack Mappings: The Top Native Security Controls for Ransomware

| | Blog
For the first time, organisations can visually see what Azure security controls can offer in terms of protection, detection and response. With 45 native Azure security control mappings, defenders can start focusing ...

Standing Up for Our Principles: AttackIQ Signs the Respect In Security

| | Blog
I’m proud to share that AttackIQ has signed the Respect in Security pledge. As a member of the cybersecurity community, we are committed to the prevention of all forms of harassment within ...
Teamwork Making the Dream Work!

Teamwork Making the Dream Work!

| | Blog
Why I’m Particularly Proud AttackIQ Made the 2021 Fortune Great Place to Work List The post Teamwork Making the Dream Work! appeared first on AttackIQ ...
Healthcare Under Siege

Healthcare Under Siege: Should Hospitals Pay Hackers Ransom?

| | Blog
In 2020, three of the top 10 most searched terms were, unsurprisingly, healthcare-related. (Coronavirus, coronavirus update, coronavirus symptoms.) We’ve never been so attuned to what’s happening in our healthcare systems and hospitals ...
Purple Teaming for Dummies eBook

Purple Teaming for Cybersecurity Effectiveness: 10 Lessons

| | Blog
How do you improve your security posture by standing up a purple team strategy? Here are 10 important things to keep in mind from the Purple Teaming for Dummies eBook. The post ...

How purple team operations helped defend the Pentagon — and can help your security team today.

The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations. The post How purple team operations helped defend the Pentagon ...
The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided

The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided

| | Blog
On July 2, 2021, the REvil ransomware group successfully exploited a zero-day vulnerability in the on-premise Kaseya VSA server, enabling a wide-scale supply chain cyber attack. Let’s dig in and see how ...
How to Pitch Your CFO on Automated Security Control Validation

How to Pitch Your CFO on Automated Security Control Validation

| | Blog
CFOs are often perceived as gatekeepers to the company’s cash coffers. With different functional leaders vying for project investments, it is true that the role of the CFO is to help prioritize ...