Search Results for: network management Blog Post Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... Blog Post How the SolarWinds Hack Happened – Everything You Need to Know February 4, 2021 Since mid-December 2020, the U.S. government, the security community, big business, and big tech have been reeling in the face... Blog Post “We Swear, We Will Not Cyber-Attack Your Healthcare Company During Coronavirus Pandemic” March 21, 2020 Two leading cybercrime gangs who committed two of the most prolific ransomware threats promised that they will not attack healthcare... Blog Post Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting... Knowledge Center Incident Response Management Retainer July 29, 2019 Without a comprehensive Incident Response Strategy, your exposure to adversaries destroying your data, damaging your brand and dramatically impacting your... Blog Post COVID-19 Alert: Coronavirus Email Phishing Scams are on the Rise March 26, 2020 We are observing a growing number of phishing attacks where the attackers are exploiting the COVID-19 situation to give their... Blog Post GE Healthcare’s Patient Monitors are Vulnerable, warned DHS February 2, 2020 The U.S. Department of Homeland Security’s Network and Infrastructure Security Agency issued an alert about a series of breakthroughs found... Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Blog Post Vulnerability Threatens Intel That Leads To Affect Its Users January 13, 2022 A recent Intel security vulnerability allows unauthorized individuals with physical access to exploit and install malware on the chip. The... Blog Post SecurityScorecard acquires LIFARS to establish a DFIR services practice February 7, 2022 Our world is changing rapidly. More than ever, organizations are reliant on digital technologies to do business. Cyber threats continue... Blog Post Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will... Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year... Blog Post Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It? February 12, 2021 Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance,... Blog Post NSA and CISA Warn About Russian GRU Brute-Force Cyberattacks against US, Global Organizations August 3, 2021 Recently, top US security agencies warn about the wave of brute-force cyberattacks by the Russian military intelligence agency named GRU....
Blog Post Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect...
Blog Post How the SolarWinds Hack Happened – Everything You Need to Know February 4, 2021 Since mid-December 2020, the U.S. government, the security community, big business, and big tech have been reeling in the face...
Blog Post “We Swear, We Will Not Cyber-Attack Your Healthcare Company During Coronavirus Pandemic” March 21, 2020 Two leading cybercrime gangs who committed two of the most prolific ransomware threats promised that they will not attack healthcare...
Blog Post Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting...
Knowledge Center Incident Response Management Retainer July 29, 2019 Without a comprehensive Incident Response Strategy, your exposure to adversaries destroying your data, damaging your brand and dramatically impacting your...
Blog Post COVID-19 Alert: Coronavirus Email Phishing Scams are on the Rise March 26, 2020 We are observing a growing number of phishing attacks where the attackers are exploiting the COVID-19 situation to give their...
Blog Post GE Healthcare’s Patient Monitors are Vulnerable, warned DHS February 2, 2020 The U.S. Department of Homeland Security’s Network and Infrastructure Security Agency issued an alert about a series of breakthroughs found...
Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across...
Blog Post Vulnerability Threatens Intel That Leads To Affect Its Users January 13, 2022 A recent Intel security vulnerability allows unauthorized individuals with physical access to exploit and install malware on the chip. The...
Blog Post SecurityScorecard acquires LIFARS to establish a DFIR services practice February 7, 2022 Our world is changing rapidly. More than ever, organizations are reliant on digital technologies to do business. Cyber threats continue...
Blog Post Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will...
Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...
Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year...
Blog Post Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It? February 12, 2021 Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance,...
Blog Post NSA and CISA Warn About Russian GRU Brute-Force Cyberattacks against US, Global Organizations August 3, 2021 Recently, top US security agencies warn about the wave of brute-force cyberattacks by the Russian military intelligence agency named GRU....