Protecting Healthcare Organizations from Ransomware Attacks

Active Directory has been a top cybersecurity tool for more than two decades. The problem with protecting AD—used by roughly 90% of the Fortune 1000 companies—from ransomware attacks is simply that it ...

Organizations Prioritize ITDR Solutions That Protect Active Directory Before, During, and After a Cyberattack

The word is out that identity systems—and Active Directory in particular—are prime targets for cyberattacks. As a company that pioneered solutions purpose-built for protecting and recovering Active Directory from cyberattacks, we were ...
ransomware

LAUSD Ransomware Attack: Action Too Little, Too Late?

Going back to school in a pandemic after a long summer is frenetic enough without a ransomware attack disrupting educators’ best-laid plans. The Los Angeles Unified School District avoided just such a ...
Security Boulevard
Barracuda Dell data center risk fintech ransomware zero-trust data security

Barracuda Networks Extends Cybersecurity and Data Protection Portfolio

At the Secured.22 virtual conference, Barracuda Networks announced it has added a range of capabilities that collectively tighten integration across its portfolio of cybersecurity and backup and recovery platforms. Brian Babineau, chief ...
Security Boulevard
SentinelOne Uptycs Lacework Palo Alto CNAPP cloud security misconfiguration multi-cloud security Cloudflare cloud disaster recovery DR security

High Availability and Security for Cloud-Based Systems

IT organizations striving to ensure compliance with HIPAA, Sarbanes-Oxley, BASEL II and similar regulations generally have a good grasp of the security considerations that apply to key hardware and software systems running ...
Security Boulevard

Achieving Operational Resilience with Simon Hodgkinson

Does your cybersecurity plan take your organization’s goals for operational resilience into account? In a recent episode of the Hybrid Identity Podcast (HIP), I spoke with Semperis strategic advisor, former bp CISO, ...
CSPM, cloud-based, Wiz multi-cloud, security, CNAPP cloud computing cybersecurity Orca Kubernetes TDIR cloud and container security

3 Keys to an Effective Kubernetes Disaster Recovery Plan

The security of Kubernetes workloads is being put to the test. In Europe, IT teams have been dealing with simultaneous spikes in cyberattacks and extreme weather events, making it extremely difficult for ...
Security Boulevard

Securing Active Directory Is First Step in Aligning with New UK Financial Conduct Authority Guidelines

In 2019, the Financial Conduct Authority (FCA) proposed changes to how institutions within the UK financial sector ensure operational resilience, particularly against the threat of cyberattacks. The FCA will start enforcing the ...

Creating Your Disaster Recovery Action Plan

Perhaps Disaster Recovery (DR) isn’t one of the hot terms like the Internet of Things (IoT) or Hybrid Cloud, but I would argue that re-examining your DR plan now might be one ...
LockBit ransomware ransom

Ransomware has Pushed Backup to the Breaking Point

Increasingly, when ransomware successfully infiltrates and encrypts a large company’s data, they pay the ransom, which comes as a surprise to many. For instance, when Colonial Pipeline was hit by a ransomware ...
Security Boulevard