Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Filters
Showing 247–252 of 473 results
Vulnerable ≠ Exploitable: A lesson on prioritization
Pen testers, vulnerability scanners, and installed agents alert on potential vulnerabilities and breaches. You receive a list, or a notification, and you respond. Ever wonder how much of your time and effort is being wasted fixing things that don’t actually matter?
Read More Patched ≠ Remediated: Healthcare Faces an Aggressive Threat Landscape
One of our clients, a leading U.S. hospital and healthcare system, consistently earns high marks for clinical excellence and is among the top 10 percent in the nation for patient safety. Recognizing the growing cybersecurity threats to healthcare organizations and importance of importance of maintaining compliance with regulatory standards like HIPAA, PCI, and other privacy rules, the organization’s IT staff...
Read More 65% Say Legacy Backup Solutions Aren’t Up To Ransomware Challenges
Information Security Buzz: 09/12/22 The cloud is often hailed as the “infrastructure of the future”, and with numerous organizations, businesses, government agencies, and individuals switching to the cloud for their storage needs, securing this asset has become a top priority. Read the entire article here
Read More The La School District Cyber Attack Keeps Unravelling – Expert Comments
Information Security Buzz: 09/12/22 While there’s been a lot of speculation about the attack targeting the Los Angeles Unified School District, it’s unclear when the attackers gained initial access to the network and if the report accurately reflects the school district’s network’s vulnerabilities as it exists today. Read the entire article here
Read More Orgs adopt military mindset to combat rising cybersecurity attacks
SiliconANGLE: 09/08/22 War and conflict have evolved past guns and tanks and are now commonly fought with more subtle weapons. So, another dimension to the expanding cybersecurity threat landscape is the weaponization of computing by foreign actors on their sovereign nation enemies. Read the entire article here
Read More Top Cybersecurity Startups to Watch in 2022
eSecurity Planet: 09/01/22 This article looks at the top 60 cybersecurity startups to watch in 2022 based on their innovations in new and emerging technologies, length of operation, early funding rounds, scalability, and more. Read the entire article here
Read More