IT Security
How to secure your network from a Ryuk ransomware attack
Universal Health Services (UHS), a Fortune 500 company and healthcare services provider, has reportedly shut down systems at facilities throughout the United States after the Ryuk ransomware hit its network on September 27, ...
IT security under attack blog series: Instant domain persistence by registering a rogue domain controller
In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this ...
Sumo Logic Finds Attack Surface Expanding
An annual report published today by Sumo Logic, a provider of security tools delivered as a cloud service, highlights the degree to which security has fundamentally shifted in the age of the ...
5 user behavioral patterns to look out for in a decentralized workspace
Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe? Solution: You should monitor your employees wherever they’re located, and devise a ...
Securing VPN and RDP access to sensitive resources [Free e-book and webinar]
At times, life during COVID-19 pandemic can feel like something from a dystopian novel. If anyone told us ahead of time that we’d be working from home due to a deadly virus outbreak ...
Five Worthy Reads: Has the pandemic accelerated digital transformation?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how the pandemic and the rise of the remote ...
Cisco Advances Effort to Simplify Security
Cisco Systems has updated SecureX, a free console it provides for its portfolio of security offerings, to include sample extended detection and response (XDR) workflows along with additional analytics and a refreshed ...
Is IT security under attack?
From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough on IT security. In the wake of the COVID-19 pandemic, companies around the ...
Five worthy reads: Preparing an incident response plan for the pandemic and beyond
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we ...
Sophisticated phishing
Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam. However, in this ongoing ...

