Webinar: Learn Proactive Supply Chain Threat Hunting Techniques

April 23, 2024 at 08:27AM A webinar titled “Supply Chain Under Siege: Unveiling Hidden Threats” is being offered by industry experts to equip attendees with knowledge on identifying and neutralizing supply chain threats in the cybersecurity landscape. The session will cover the anatomy of supply chain threats, proactive threat hunting methodologies, case studies, practical steps … Read more

Rebalancing NIST: Why ‘Recovery’ Can’t Stand Alone

April 18, 2024 at 10:04AM Companies are now prioritizing cybersecurity as a top operational risk, with updated guidance from NIST providing valuable insights. However, the focus on prevention often overshadows the critical aspect of recovery from cyberattacks. It’s essential to integrate recovery into the overall security strategy, including continuous testing and alignment with incident response … Read more

Recover from Ransomware in 5 Minutes—We will Teach You How!

April 18, 2024 at 07:36AM Zerto, a Hewlett Packard Enterprise company, provides super low RPO with Continuous Data Protection to detect and recover from ransomware in real time. Its application-centric approach and real-time encryption detection offer early warning signs of an attack, while enabling instant file level recovery and fast failover to a secondary site. … Read more

Kim Larsen New Chief Information Security Officer at SaaS Data Protection Vendor Keepit

April 16, 2024 at 04:29PM Kim Larsen, a seasoned cybersecurity leader with 20+ years of Govt and private sector experience, has joined Keepit as the new CISO. Larsen’s expertise spans business-driven security, risk management, and aligning digital strategies. His strategic insights and unique perspective position him to elevate Keepit’s security advisory capabilities and future services. … Read more

Enterprise Endpoints Aren’t Ready for AI

April 16, 2024 at 04:00PM Enterprise AI transformation readiness requires devices capable of running AI applications. Absolute Security’s analysis found majority of organizations need system updates or replacements to be AI-ready. Absolute Security’s Cyber Resilience Risk Index 2024, based on telemetry from millions of devices, reveals most enterprise PCs lack the minimum 32 GB RAM … Read more

Cybersecurity Decluttered: A Journey to Consolidation

April 12, 2024 at 01:35PM The text “Cybersecurity Decluttered: A Journey to Consolidation” discusses the evolving cybersecurity landscape and the need for businesses to streamline their security stack. It emphasizes the challenges of managing disparate security tools and proposes a consolidation strategy to achieve a core set of safeguards. The authors advocate for a proactive … Read more

Cohesity Extends Collaboration to Strengthen Cyber Resilience With IBM Investment in Cohesity

April 11, 2024 at 04:53PM Cohesity announced an expanded collaboration with IBM to enhance cyber resilience capabilities for increased data security and recovery across hybrid cloud environments. The collaboration, including funding and expertise from IBM, aims to address the growing threat of data breaches through innovative end-to-end software-defined solutions. This collaboration brings together Cohesity DataProtect … Read more

Pentagon Outlines Cybersecurity Strategy for Defense Industrial Base 

March 29, 2024 at 09:24AM The US Department of Defense released a cybersecurity strategy for the defense industrial base (DIB) with four main goals for fiscal years 2024-2027. It aims to protect warfighting capabilities, strengthen DOD governance, improve DIB cybersecurity posture, preserve critical capabilities, and enhance collaboration with the DIB to defend against cyber threats … Read more

Threat Report: Examining the Use of AI in Attack Techniques

March 27, 2024 at 04:16PM Organizations need to comprehend AI-based threats to counter the advantage they provide to wrongdoers. Understanding the nature of these threats is crucial in the current landscape. Based on the meeting notes, it’s essential for organizations to grasp the nature of AI-based threats and devise strategies to mitigate the advantage that … Read more

The OODA Loop: The Military Model That Speeds Up Cybersecurity Response

March 25, 2024 at 03:00PM In the fast-paced realm of cybersecurity, time is of the essence. Cybercriminals exploit vulnerabilities within 24 hours of access. To combat this, the OODA Loop Military Model, built on Observe, Orient, Decide, and Act, aids defenders. SASE, a cloud-native architecture, harnesses this model by consolidating security controls, enabling real-time visibility, … Read more