-
Users who neglected to install security patches issued by VMware two years ago are now being hit by a big ransomware attack wave.
-
Why use third-party security tools for Active Directory account cleanups when the ubiquitous PowerShell serves just as well?
-
Veeam Software published a Data Protection Report for the new year, finding even more ransomware attacks plagued organizations in 2022.
-
Davos is seen by some as the place where global elites gather annually to chart how things here on earth will work in the future.
-
Setting up a peering connection between VPCs in two different regions can help to simplify your disaster recovery efforts.
-
"Fully 75 percent of respondents say that cloud computing represents the single greatest expansion of the enterprise attack surface in the last 20 years!"
-
Microsoft has been busy removing internet domains identified as being criminally used by bad actors, including those sponsored by nations.
-
The longstanding IT balance between usability and security was tipped in favor of the former during the pandemic-driven remote work wave in many organizations, new research indicates.
-
Generally, cybersecurity experts advise stricken enterprises to not pay off the ransom to get their IT systems and data back. Now, one country is considering making that advice actual law.
-
"If a company is to have a viable future, the network needs to be multicloud-enabled, ubiquitous, reliable, secure, and agile."
-
Some 15 years after becoming a thing, DevSecOps is lagging in the enterprise, primarily held back by organizational culture.
-
Amid cybersecurity threats like the current ransomware deluge, organizations are increasingly delegating cloud protection services like backup and disaster recovery to specialists, a new report indicates. What's more, despite a massive cloud migration, some workloads are reversing direction, moving from the cloud back to on-premises datacenters.
-
"The SIEM market is maturing at a rapid pace and continues to be extremely competitive. The reality of what SIEM was just five years ago is starting to detach from what SIEM is and provides today."
-
Microsoft is no longer primarily relying on ISV partners to innovate and provide security solutions. Here's an overview of enhanced Defender offerings.
-
Threat intelligence specialist Mandiant has noticed ransomware actors have been increasingly attacking virtualization platforms in their efforts to extort organizations for money.
-
In choosing a cybersecurity incident response service, organizations should look for vendors with a long-tail approach to helping the victim in "rebuilding trust" by restoring brand and reputation, says a new research report.
-
Survey after survey in the IT industry point to one common pain point: finding cloud computing, cybersecurity and other tech talent to fulfill enterprise initiatives. It was bad before the wave of pandemic-spurred job-quitting and apparently has only gotten worse. And that's during a time of increasing ransomware and other cybersecurity attacks.
-
As if you didn't have enough to fret about from rampant ransomware and other cybersecurity threats, Orca Security has published a new survey-based report on a new worry: "alert fatigue."
-
Misconfiguration was still the No. 1 cause of cloud security incidents last year, says a report from Check Point Software Technologies.
-
Red Hat was surprised by this finding from its new report on open source software in the enterprise: It's now seen as a benefit, when it was a big security problem not that long ago.
-
After looking at MDI in an overview of the Microsoft 365 Defender family, Paul Schnackenburg takes a deep dive and shares why he thinks it's an excellent addition to the protection of your on-premises Active Directory network.
-
A new data protection report from Veaam shows the tremendous impact of ransomware and other cybersecurity attacks currently plaguing the IT industry.
-
"Many people still think of a ransomware actor as the proverbial 400-pound hacker in his mom's basement -- nothing could be further from the truth," says in-the-trenches security expert Allan Liska.
-
While Windows is generally seen as the most malware-vulnerable OS, cloud computing is mostly done on Linux, so VMware has published a threat report about malware in Linux-based multi-cloud environments.
-
A new Veracode report on application security finds that while things are generally getting better, some persistent problems remain, including the use of flawed open source and third-party code libraries.