Preparation Requires Prioritizing Threats

As the attack methods and strategies of our cyber adversaries continue to expand, organizations must stay ahead of those threats most likely to affect individual networks and connected resources. According to Fortinet’s most recent global Threat Landscape Report, not only are cybercriminals using new attack methods (even for older attacks), Continue Reading

What Makes Local Government an Enticing Cyber Target?

Recent and well publicized cyber attacks are damaging, costly, and have the potential to deprive communities of essential services, but stopping them poses significant challenges. Local government CISOs and IT departments face pressures from all sides: on the one hand, citizens are demanding digital services and frictionless online experiences, but Continue Reading

Securing the Network Edge

A New Joint Analysis from the Cyber Threat Alliance Outlines the Growing Threat to the Devices Deployed at the Boundaries, or Edges, of Interconnected Networks     Digital transformation continues to generate new networking environments, from multi-cloud networks to SD-Branches to the emerging 5G-enabled remote edge, comprised of a growing number of Continue Reading

An introduction to AppArmor

Cyber attacks are becoming more sophisticated, attack frequency is on the rise, and the cost of cybercrime damage is projected to reach $6 trillion annually by 2021. Traditional defensive measures such as firewalls and intrusion detection systems that operate at the network perimeter are no longer enough to protect today’s distributed Continue Reading

ReadySpace Cloud Drive – Petya Security Patch

Hi All, Due to the cyber attacks against Danish companies, we will be performing a priority update of all our Cloud Drive servers today. This patch was released late March 2017 and is considered to cover more than 80% of  Petyas exploits.  We expect no downtime, and smaller disturbances will Continue Reading

Trends Affecting Managed Security Service Providers

Given the very public explosion of ransomware, and an ever-growing list of other cyber threats, IT services providers are increasingly looking for ways to meet the insatiable demand for cybersecurity. In this Q&A article with Jonathan Nguyen-Duy, we look at some of the trends and challenges facing the MSSP community. How Continue Reading

The Essential 8: ASD’s strategies to mitigate cyber security incidents

The Australian Signals Directorate’s (ASD) ‘Essential 8’ strategies to mitigate cyber security incidents represent a set of cyber security best practices that, when implemented successfully, will provide your agency with a baseline cyber security posture. The Essential 8 expand upon the ‘Top 4’ mitigation strategies, part of the government’s Protective Continue Reading

Threat Perspective: Risky Business, A Look Inside the Threat Actor Studio

There’s no denying that cyber crime has become a business, and business is booming. British insurance giant Lloyd’s of London estimated the cyber crime market at $400 Billion in 2015. As a result, the World Economic Forum estimates that the total economic cost of cybercrime to currently be $3 trillion Continue Reading

Managed Security Service Providers, Choosing the Right Security Vendor

Businesses struggling to secure their networks against determined cyber attackers are facing a perfect storm of challenges: most networks are in the midst of a dramatic transformation, including IoT, virtualization, and the cloud, the number and sophistication of network attacks is increasing, the cost of being breached continues to rise, Continue Reading

Q&A: Securing IoT in the World of Healthcare

According to IBM’s 2016 Cyber Security Intelligence Index report, cyber criminals attacked healthcare more than any other industry last year, with more than 100 million healthcare records being compromised. As the use of IoT devices continues to grow in hospitals, we talked to Roger Bailey about the risks, and how Continue Reading

>