A Summary Analysis of the SolarWinds Breach What happened? In the simplest of terms, SolarWinds – a company synonymous with Network Management Systems (NMS) that is used almost universally across …
Every Zero Trust strategy follows this simple principle: never trust, always verify. Building a Zero Trust architecture prevents cybersecurity attacks and data breaches using protect surfaces. Organizations build many of these protect …
Never trust, always verify According to the World Economic Forum, zero trust is the way forward—and the US government agrees. “The zero trust model has been widely recognized as an effective …
If you work in cybersecurity at a typical mid-market company, you probably cringe when you hear the term “vulnerability management.” Let me see if I can guess how the workflow …
Welcome to 2021. I felt like I needed to write that we survived 2020 and are now well on our way to whatever things this year holds. In this series, …
As data breaches and cyberattacks have become commonplace, organizations are finding themselves doing more and more to defend themselves and improve their network and cloud security. One such effort includes …
Ransomware attacks are nothing new. Thousands of businesses have fallen prey to malicious attackers for decades, paying billions in ransom and disrupting operations from a few days to a few …
The Covid-19 pandemic changed everything about the way we work, play and live — literally overnight. But here, let’s focus on the way we work since that’s the basis for …
When it comes to cybersecurity, mid-market organizations are uniquely challenged. They encounter many of the same issues that large enterprises do, but in most cases are forced to try to …
AWS recently changed its underlying alert creation in Security Hub. If you enabled more than one control, you’re likely getting repeats of the same alert from the different controls. With AWS’s …