Five Tips for Selecting a Managed Detection and Response Service Provider

Relentless threat actors and complex technology stacks make it challenging for IT teams to keep up with the volume of cybersecurity threats – and even more difficult to respond to them rapidly. Compounding matters is the tight cybersecurity labor market characterized by too many job openings and a growing talent shortage. In this environment, security […]
Why Gartner is Urging Organizations to Protect Against Identity Threats and Credential Abuse

With the growing support for a hybrid work environment and continued migration to cloud applications, Gartner is predicting an increased trend in identity-based attacks and credential abuse. Today’s cybercriminals are looking for ways to steal credentials, escalate privileges, and move laterally across an organization’s infrastructure. Given that identity compromises are present in most ransomware and […]
Takeaways From Notable Law Firm Data Breaches

Law firms collect sensitive and privileged data, making them prime targets for cyberattacks. Unfortunately, some of these attacks succeed and the news of a law firm data breach becomes part of the public domain. This is why law firms need a strong cybersecurity posture to defend against modern threats. This blog discusses specific threats, what […]
Increased Cybersecurity Risks from Russian Cyber Attacks Resulting From the Russia Ukraine Conflict

A barrage of sanctions from the U.S. and E.U. continues to rain down on Russia following Vladimir Putin’s decision to invade Ukraine. The damage inflicted by these sanctions poses concerns about possible retaliation measures against Western nations. Given Russia’s significant capabilities and history of cybercrime, it appears likely that Russian cyber attacks, particularly against critical […]
2021 Cyber Attacks and Lessons Learned to Strengthen Your Defenses in 2022

Cyber attackers continued to successfully target organizations in all sectors and of all sizes during 2021. The biggest cyber attacks in 2021 resulted in damaging financial, reputational, and even societal consequences. Security leaders and teams should use the lessons learned from high-profile attacks to improve their organization’s security posture. Let’s look at 7 major cyber […]
Best Practices for Endpoint Security

In today’s highly technical world, endpoint devices are everywhere. Endpoint devices, such as employee workstations, laptops, tablets, and smartphones, connect to and communicate with an organization’s network. Because they are intertwined within an organization, it often only takes successfully exploiting one endpoint for threat actors to carve a path through an organization’s network to cause […]
Why An MDR Service Provider for Healthcare Organizations Makes Sense

Healthcare organizations collect and process a lot of sensitive data, making them a prime target for opportunistic cybercriminals. Managing security in-house is a complex undertaking, which is why many healthcare organizations look to outsource some or all of their security needs. Here are our top three reasons partnering with a managed detection and response (MDR) […]
Kaseya VSA Security Breach

Overview | Kaseya VSA On July 2, 2021, right before Americans started their long, Independence Day weekend, hackers once again made their way to the top of the news headlines. This time, the victim of the largest ransomware attack was Kaseya, a technology company that sells its technology to other third-party providers, mainly managed service […]
Lessons Learned: Ransomware Attacks in 2021

While ransomware attacks in 2021 never cease to stop, several high-profile occurrences in the first half of the year gained swift notoriety for either the scale of damage they inflicted or the targets they focused on. Here are four of the biggest attacks, and the lesson that can be learned from each. Colonial Pipeline A […]
DarkSide Ransomware Explained

Overview | Darkside Ransomware DarkSide ransomware was first discovered in the wild in August 2020. It runs a Ransomware-as-a-Service (RaaS), whereby affiliates are able to deploy the ransomware for a fee or a cut of the proceeds from successful ransom payments. The DarkSide ransomware group was brought to mainstream attention due to the recent ransomware […]
#HowTo: Identify and Appoint the Right Security Partner for Your Organization

This article originally appeared in InfoSecurity Magazine In the field of cybersecurity, finding a partner you trust can be daunting. It’s an area that still creates uncertainty within many organizations, so it’s no wonder many cybersecurity executives may be hesitant to make this move. But given the mounting list of CISO challenges, from justifying resource requirements […]
Codecov Breach – What You Need to Know

What was the Codecov Breach? Supply chain attacks are far from new. We previously covered the SolarWinds attack, which may be the biggest software supply chain attack disclosed, as well as the most damaging supply chain attack to users. In more recent news, a new cyber-attack similar to the SolarWinds attack was discovered on a […]