U.S. Critical Infrastructure: Addressing Cyber Threats and the Importance of Prevention

The critical infrastructure of the United States includes all those systems and assets that are essential to the proper functioning, economy, health, and safety of American society. The roads and railways that we travel on; the Internet and the mobile … Continue reading U.S. Critical Infrastructure: Addressing Cyber Threats and the Importance of Prevention

Cryptocurrency scam attack on Twitter reminds users to check their app connections

Are you doing enough to prevent scammers from hijacking your social media accounts? Even if you have chosen a strong, unique password for your online presence and enabled two-factor authentication it’s possible that you’ve overlooked another way in whi… Continue reading Cryptocurrency scam attack on Twitter reminds users to check their app connections

Qlocker ransomware gang shuts shop after extorting owners of QNAP NAS drives

With all the headlines about ransomware attacks hitting companies hard, you might think there’s only bad news around the subject. Well, think again. Not only has the Darkside ransomware gang seemingly shut down since the high-profile attack which resul… Continue reading Qlocker ransomware gang shuts shop after extorting owners of QNAP NAS drives

Cybersecurity Training: Raising Awareness And Securing Your Business

Organizations are increasingly faced with threats from sophisticated criminal organizations and nation-state actors.  To mitigate the risks posed by cyber criminals, organizations must secure and protect their proprietary and sensitive information. The… Continue reading Cybersecurity Training: Raising Awareness And Securing Your Business

Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure

Over the weekend, the Alpharetta, GA based Colonial Pipeline was hit by an extensive ransomware attack that shut down its information technology (IT) and industrial operational technology (OT) systems. Simply put, an all-too-common ransomware event tar… Continue reading Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure

Creating Cloud Security Policies that Work

Now that the ongoing worldwide trend toward “going digital” has been accelerated by COVID-19, taking extra precautions to protect your organization’s data, communications and information assets is more important than ever. Of course, there are many tra… Continue reading Creating Cloud Security Policies that Work

World Book Day: Cybersecurity’s Quietest Celebration

The last time you were in a library, or a bookstore, you probably noticed how quiet it was.  This doesn’t mean that people weren’t excited, or downright celebrating, they were engaged in a different method of celebration; the kind that takes place betw… Continue reading World Book Day: Cybersecurity’s Quietest Celebration

Cybersecurity in MEA: A Chat with Tripwire’s New RSM for the Africa and Levant Region

Tripwire recently hired Naoufal Mzali as its first local regional sales manager specifically for the Africa and Levant region. I therefore decided to sit down with Naoufal and have a chat about cybersecurity and Tripwire’s mission for the region. Here’… Continue reading Cybersecurity in MEA: A Chat with Tripwire’s New RSM for the Africa and Levant Region