I Triggered a Ransomware Attack – Here’s What I Learned

Ransomware attacks are perceived as complicated, confusing and dangerous. While all those things are true, there are also some basic truths about ransomware attacks that can be used to stop an attack quickly, minimizing or eliminating the damage they … Continue reading I Triggered a Ransomware Attack – Here’s What I Learned

4 Startups Driving Cybersecurity Innovation

Constant innovation is a constant within cybersecurity. Information technology evolves and bad actors adjust with new attack vectors. Cybersecurity must innovate to keep pace with both IT and attackers by improving cybersecurity tools. Product categor… Continue reading 4 Startups Driving Cybersecurity Innovation

Splunk Unfurls Security Operations Center as Cloud Service

Splunk, after its recent announcement of intent to acquire TruSTAR to gain access to a cybersecurity analytics tool, today launched a security operations center (SOC) delivered as a cloud service. Jane Wong, vice president of product management for se… Continue reading Splunk Unfurls Security Operations Center as Cloud Service

Ransomware and the Tax Code’s Perverse Incentive

Ransomware payments are deductible, say tax experts: That’s the shocking finding from a recent investigation.
The post Ransomware and the Tax Code’s Perverse Incentive appeared first on Security Boulevard.
Continue reading Ransomware and the Tax Code’s Perverse Incentive

Critical Infrastructure is Missing Something Critical

The Colonial Pipeline attack was yet another reminder that critical infrastructure is in desperate need of stronger security. The attack is one of the most recent victims of cyberattacks on critical infrastructure; the phenomenon is not new, nor is it… Continue reading Critical Infrastructure is Missing Something Critical

Adding AI/ML to Mobile Security

Many organizations are turning to artificial intelligence (AI) and machine learning (ML) to boost their cybersecurity systems, but you mostly hear about how AI is used to monitor networks and perform the time-consuming tasks that are overwhelming for … Continue reading Adding AI/ML to Mobile Security

How Air Gapping Can Protect IP

In today’s hyperautomated world, organizations connect various environments, applications and databases to one another, creating complex infrastructures. Security professionals discuss the difficulties inherent in securing cloud environments, and the … Continue reading How Air Gapping Can Protect IP

Cybercriminals Increasingly Target Manufacturing, IP

Recent attacks targeting intellectual property (IP) and critical infrastructure are raising the security stakes for manufacturing organizations, as the industry records one of the highest attack rates of any sector since the onset of COVID-19. One in … Continue reading Cybercriminals Increasingly Target Manufacturing, IP

Cops Cop Cl0p Ransomware Gang (or Maybe Not?)

The National Police of Ukraine is crowing about arresting eight alleged ransomware scrotes from the Clop gang.
The post Cops Cop Cl0p Ransomware Gang (or Maybe Not?) appeared first on Security Boulevard.
Continue reading Cops Cop Cl0p Ransomware Gang (or Maybe Not?)