Cyber Attacks Resources

Cyber Attacks news and support resources, featuring the hottest solutions, technologies and vendors in the Cyber Attacks world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

  1. Home
  2. Tag "Cyber Attacks"

HIPAA Violation Damage Control Tips

LUA
HIPAA violations can result in hundreds of thousands of dollars in fines. These violations are often caused by breaches, cyber threats, and human errors that compromise patient protected health information (PHI). Here are some tips for managing HIPAA violations that impact your patients and your organizations. After A HIPAA Violation – Lessons Learned From VUMCHealthcare […]

Citrix: Real Time Cyber Threat Detection and Remediation

Citrix Systems
The cyber threat landscape is changing rapidly. In addition to basic IT/InfoSec blocking and tackling of weak passwords, elevated service account permissions, and the human vector, we now have to deal with ransomware and Mirai-like botnet attacks. System logs were once good enough. The speed at which these threats are occurring has shifted from days […]

Preserving Your Network’s Immune System

Ivanti
Good hygiene and a healthy immune system are essential to fighting foreign intruders like viruses and microscopically malicious bacteria. Much like the human body, protecting the pores of your network are critical to staving off viruses of the digital variety. It may be a corny comparison, but it’s a common sense approach to endpoint security—one that […]

VMware: Securing Electronic Healthcare Records

VMware
We didn’t find any medical sutures or gauze at HIMSS last week, but there sure was a lot of talk about the future of healthcare IT security. The status of electronic health record (EHR) security as a hot topic is clear, too: patient information is increasingly being moved to electronic form in order for healthcare organizations […]

VMware Joins Intel to Offer Complementary Healthcare Security Readiness Program to Reduce Health IT Risk and Improve Patient Care

VMware
New program empowers healthcare IT teams to quickly assess gaps in security readiness and identify opportunities for improving security posture VMware, Inc. (NYSE: VMW) today announced a collaboration with Intel Health and Life Sciences to help global healthcare organizations better understand the current state of their security readiness. Joining Intel’s Healthcare Security Readiness Program, VMware […]

Cisco: A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats

Cisco
At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s need of monitoring […]

Microsoft: Key updates to Azure Backup Server

Microsoft
Microsoft Azure Backup Server (MABS) is a cloud-first backup solution to protect data and workloads across heterogeneous IT environments of enterprises. It is available as a free download with Azure Backup without the requirement of System Center License or SQL license for server DB. The latest update released for Azure Backup Server ensures that customers […]

Cisco: Malware Analysis for the Incident Responder

Cisco
Malware is one of the most prevalent and most insidious forms of cyber attack.  Identifying and eliminating them are critical in minimizing the impact of a breach.  As a cybersecurity incident responder, I always end up performing some level of malicious file analysis.  In this blog, I’ll share some recommended approaches that have worked for […]

Microsoft: Cyber Security Attackers Toolkit – What You Need to Know

Microsoft
Cyber attackers have many tools available to them to infiltrate an enterprise network, find that sensitive piece of data they’re looking for, and exfiltrate it from your enterprise. In conversations with customers, I’ve found that some are familiar with these tools; however, many aren’t, or they are not fully aware of how powerful these tools […]

Security, Windows 10, Mobility Drives Thin Client Adoption

IGEL Technology
With 2017 upon us, it’s time to reflect on some of the key trends in 2016 and how they will impact IT in the year to come. In the spirit of the New Year, I’d like to offer the following 2017 predictions as organizations respond to key trends from this past year: 2016 Trend: Heightened […]

Citrix: Ninety-nine Problems and Security is the Biggest One

Citrix Systems
“The Need for a New IT Security Architecture: Global Study” As we’ve seen from the last year’s headlines, cyber attacks happen by the minute, and in our industry on the whole, they’re not being handled adequately. To get a better view of why that is, we teamed up with the Ponemon Institute to find out what’s […]

Citrix: Global Survey Shows That 83 Percent of Business Respondents Say Their Company is at Risk Because of Organizational and IT Complexities (NASDAQ:CTXS)

Citrix Systems
Global IT Security Study from Citrix and The Ponemon Institute Also Shows that 74 Percent Say it’s Time for a New Security Framework Today, IT security isn’t just about waiting to respond to the next cyber attack. It is about being prepared and having the strongest possible IT security plan in place before being attacked. […]

Docker Announces Federal Security and Compliance Controls for Docker Datacenter

Docker
Security and compliance are top of mind for IT organizations. In a technology-first era rife with cyber threats, it is important for enterprises to have the ability to deploy applications on a platform that adheres to stringent security baselines. This is especially applicable to U.S. Federal Government entities, whose wide-ranging missions, from public safety and […]

With Privileged Identities Repeatedly Targeted in Cyber Attacks, How Do We Protect Them?

ManageEngine
If there is one lesson to be learned from the countless data breaches we read about on a daily basis, it is this: Our privileged identities are repeated targets for hackers around the world. Take any case—from the US OPM hack to the recently reported data breach at Three, a British mobile network company—the hacker’s […]

Visit Our Sponsors