What is the Cybersecurity Maturity Model Certification?

Just what is the Cybersecurity Maturity Model Certification (CMMC), and how can you make sure you can meet it? See exactly how ARIA Cybersecurity Solutions’ track record in providing solutions to achieve compliance with GDPR, HIPAA, and othe… Continue reading What is the Cybersecurity Maturity Model Certification?

Remote Security Operations Center Concerns | ARIACybersecurity

Say goodbye to the concept of “business as usual.” COVID-19 has changed virtually every normal process, including cybersecurity methods and approaches. This includes one function many companies never intended to manage remotely: their … Continue reading Remote Security Operations Center Concerns | ARIACybersecurity

9 Types of Cyber Attacks Organizations Must Prepare For

As an IT security professional, you must be hyper-aware of all the possible types of cyber attacks to your network and your business. This has always been one of the most difficult parts of your job, considering the ingenuity and perseverance of t… Continue reading 9 Types of Cyber Attacks Organizations Must Prepare For

New software enables existing sensors to detect ransomware

Engineers from SMU’s Darwin Deason Institute for Cybersecurity have developed software to detect ransomware attacks before attackers can inflict catastrophic damage. Ransomware is crippling cities and businesses all over the world, and the number… Continue reading New software enables existing sensors to detect ransomware

SymTCP: New approach to protecting Army systems without massive amounts of manual intervention

An approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies, has been identified by the Army’s corporate laboratory researchers in collaboration with the Un… Continue reading SymTCP: New approach to protecting Army systems without massive amounts of manual intervention

Increased monetization means more ransomware attacks

Organizations are detecting and containing attacks faster as the global median dwell time, defined as the duration between the start of a cyber intrusion and it being identified, was 56 days. This is 28% lower than the 78-day median observed in the pre… Continue reading Increased monetization means more ransomware attacks

Only 11% of organizations can detect intruders in under one minute

The process of detecting, triaging, investigating, and containing a cyber incident takes organizations globally on average nearly seven days of working around the clock (totaling 162 hours), with an average of 31 hours to contain a cybersecurity incide… Continue reading Only 11% of organizations can detect intruders in under one minute

Company Detected Years-Long Breach Only After Hacker Maxed Out Servers’ Storage

What could be even worse than getting hacked?

It’s the “failure to detect intrusions” that always results in huge losses to the organizations.

Utah-based technology company InfoTrax Systems is the latest example of such a security blunder, as the com… Continue reading Company Detected Years-Long Breach Only After Hacker Maxed Out Servers’ Storage