I recently had the opportunity to participate in a joint webinar between Cisco and Global Knowledge Canada to discuss Cisco’s latest cybersecurity industry research, the security challenges organizations face today, and how organizations can mitigate risks. After a detailed conversation with Brad Haynes, Cisco product specialist at Global Knowledge Canada, here are my top three […]
Cyber Attacks Resources
Cyber Attacks news and support resources, featuring the hottest solutions, technologies and vendors in the Cyber Attacks world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!
Home Tag "Cyber Attacks"
Cyber security technologies and best practices will help consumers, businesses and organizations enable a safer online environment. This video goes deeper into the best practices that can be used to better protect information and data inside and outside of your operational perimeters. Learn more: https://www.microsoft.com/en-us/safety https://blogs.technet.microsoft.com/msrc/ https://www.microsoft.com/en-us/security/default.aspx This video is from the fine folks at […]
Meet Joe CISO, the information security professional responsible for protecting the organization from all cyber threats, including ransomware, drive-by downloads and zero-day exploits. With the complexity and volume of new threats launched daily, Joe knows that conventional web security measures such as antivirus, secure web gateways, and firewalls just aren’t enough. He needs a new […]
Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as driving intelligence mechanisms to dig deeper into detecting, containing, and eradicating the latest cyber threats. Occasionally, adversaries may leave evidence on compromised devices which may […]
UPDATE: Microsoft releases version of MS17-010 SMBv1 on earlier platforms like XP and 2003. Also recommends deploy update ASAP! As many of you know, there is a ransomware attack exploding across the globe. The last headline I read estimated that 90 countries were impacted. This could be one of the biggest cybersecurity incidents we have seen […]
In this second of a four-part video series, Richard Munro, global cloud strategy director at VMware, discusses the importance and benefits of taking a Cross-Cloud approach to help all lines of the business drive innovation and deliver on their strategic IT priorities. He also considers the key questions that businesses should be asking when it […]
The online world is going through massive changes, are you coping up with it? Read on the article to understand how identity is playing an important role in modern IT evolution. The way organizations are providing services to customers across multiple channels is going through massive change. Mobile adoption, cloud computing, big data services, are […]
Ivanti employees were recently alerted by Michael Lloyd, security engineer, that a scam email had surfaced and was spreading quickly. It resembles a very convincing Google Docs invitation, and may even come from someone you know. Here’s a screenshot: Google Docs scam If you click “Open in Docs,” you will be asked to allow more access to your […]
HIPAA violations can result in hundreds of thousands of dollars in fines. These violations are often caused by breaches, cyber threats, and human errors that compromise patient protected health information (PHI). Here are some tips for managing HIPAA violations that impact your patients and your organizations. After A HIPAA Violation – Lessons Learned From VUMCHealthcare […]
The cyber threat landscape is changing rapidly. In addition to basic IT/InfoSec blocking and tackling of weak passwords, elevated service account permissions, and the human vector, we now have to deal with ransomware and Mirai-like botnet attacks. System logs were once good enough. The speed at which these threats are occurring has shifted from days […]