Municipal Ransomware Attacks 2019

Municipal Ransomware Attacks
Municipal ransomware attacks took the stage in an unprecedented way in 2019. Not only was the use of ransomware by cybercriminals more prevalent, but it was more sophisticated.  New iterations of Ryuk, Purga, and Stop ransomwares were leveraged against everyone from the small business owner to government entities. What got the attention of the federal government in 2019 was the predominant focus on...

The Rise Of Iranian Hacker Groups and What It Means For Organizations

Iranian Hacker Groups
While the intensity of the current geopolitical situation seems to have faded from the headlines as news organizations are mesmerized by impeachment proceedings, don’t be fooled into believing that the threat landscape has not dramatically changed. Worsening U.S-Iranian relations coupled with the rise of Iranian cyber attacks, Iranian sponsored cyber attacks, has proved that it's high time organizations started looking at information security as a business risk and...

Cloud Security Management: How Automated IT Security Policy Monitoring Can Help Organizations In Their Cloud Adoption Journey

Cloud Security Management How Automated IT Security Policy Monitoring Can Help Organizations In Their Cloud Adoption Journey
It becomes necessary for businesses to employ robust Cloud security management policies to prevent malicious attacks by these cybercriminals. Let’s see how automated IT Security policy monitoring can help enterprises in migrating to and adopting Cloud successfully.  Cloud Security Management There are a growing number of ‘born-in-cloud’ companies, and there are the ones that are still reluctant to migrate to...

Good Cloud Security Management Starts with Security Policy Monitoring and Deployment of Appropriate Cloud Security Solutions

Cloud Security Solutions / tools
Cloud security solutions providing automated policy auditing and enforcement are easy ways to manage the significant risk posed by policy deviations.  This article will illustrate how policy contributes to cloud security, highlight the challenges of policy auditing and enforcement that can potentially be resolved with cloud security solutions, and suggest a strategy for baselining...