Ransomware Attacks Against Local Governments on the Rise

These attacks can have disruptive, crippling consequences on major cities

Are You Susceptible to a Cyberattack?

As cybercriminals get more sophisticated and perfect their social engineering techniques, most workers don’t even realize they’ve given away login information or clicked on a malicious link until it’s far too late.

All Things Cybersecurity on Display and in Discussion at RSA 2019

Cybersecurity insiders and dilettantes alike came from near and far to San Francisco last week to RSA Conference 2019

Debunking Cybersecurity Myths: Part IV — No Target Too Small

You hear a lot about the biggest attacks because they make the biggest splash. But in reality, businesses of all sizes are constantly threatened and, yes, breached.

Arctic Wolf’s CEO Plays Nostradamus: Brian NeSmith’s Cybersecurity Predictions for 2019

So, what will 2019 bring? In a recent webinar, Arctic Wolf’s CEO Brian NeSmith offered key insights on the state of cybersecurity today and his predictions for 2019.

JW Marriot logo on device

Marriott Breach Exposes 500 Million Guest Records: Preliminary Lessons

On Friday, Marriott International announced its Starwood reservation system’s database had been hacked and personal details from up to 500 million guest records were compromised.

Transforming Cybersecurity at Scale: The Federal Government Turns to SOC-as-a-Service

“Agencies should take time to scope down processes, and gain a complete understanding of their data, services, and security capabilities to better manage security operations.”

What happens in the cloud doesn't stay in the cloud; it spreads laterally and infects all integrated systems.

Tackling Unauthorized Access in Cloud-Based SaaS Applications

It’s not your SaaS provider’s job to keep you aware of potential cases of unauthorized account access. It’s yours. 

Banking, Malware Mischief, and Managed Detection

The bank is currently involved in court action because its cyber insurance policy is not paying out as expected

When gaming isn't all fun and games ...

How Hackers Launder Money Through Video Games

Hackers’ use of video games to launder money from stolen credit cards is symptomatic of a bigger threat: compromised credentials.