Nearly 50% Of Businesses Had a Cloud-Based Data Breach or Failed Audit
In the 2022 Thales Global Cloud Security Study, commissioned by Thales and conducted by 451 Research, reported that 45% of businesses it surveyed have experienced a cloud-based data breach or failed audit in the past 12 months, up 5% from
Developing a Highly Skilled IT Security Workforce
Bill Boni is one of the leading information risk management practitioners based in the USA, with broad experience in all aspects of creating, sustaining, and transforming security protection for organizations. A visionary information security leader with outstanding written and verbal
Assessing and Mitigating the Log4j Vulnerability
A Vulnerability Management Case Study Authors of this blog post include Subramani Sundar- Director, Threat & Vulnerability Management, Tamika Miyashita- Security Project Manager, Tanveer Chowdhury- Security Manager, & Peter Bellarmine - Lead Security Engineer This is the 3rd blog post we have
Lessons Learned in Defending Against the Log4j Vulnerability – A Case Study
Authors of this Blog Post include SecureOps Employees - Michal Kavan, SOC Director - Andrew Morrison, SOC Manager and Alejandro Perez, Sr. SOC Analyst In December, several Log4j vulnerabilities also known as Log4shell or LogJam in many of the IT security
The Log4j Vulnerability is Likely to be a Significant Threat for Years
Until last month, Log4j was simply a popular Java logging framework; one of the numerous components that run in the background of many modern web applications. But since the zero-day vulnerability (CVE-2021-44228) was published, Log4j has made a huge impact
The SolarWinds Sunburst Attack: How to Protect Yourself from 5th Generation Cyberattacks
The SolarWinds Sunburst Attack: How to Protect Yourself from 5th Generation Cyberattacks Last week US government offices were targeted by one of the most sophisticated and severe attacks seen in history both because of the sophistication and scope. A series of
INTERPOL – Cybercrime Increasing at “Alarming Pace”
The State of Cybersecurity in 2020 This blog post is geared to provide a clear picture of the State of Cybersecurity in 2020 according to leading research groups and cybersecurity authorities. The post may be a bit disjointed as we’ve pulled
Why MAZE Ransomware Attacks are So Devastating
Why MAZE Ransomware Attacks are So Devastating MAZE ransomware is quickly becoming one of the most devastating strains of Windows ransomware that have infiltrated companies and organizations around the world and demanded that a Bitcoin or Cryptocurrency payment be made in
4 Key Steps to Stopping Ransomware Attacks
How Significant is the Ransomware Problem? In writing this blog post we reviewed data from a variety of surveys including the Verizon Data Breach Report, the Cybersecurity Insiders Survey, the Ponemon Survey Data, a survey conducted by HelpSystems in conjunction with
Ransomware is Targeting Industrial Control Systems
Industrial Control System (ICS) Ransomware is Evolving…Quickly Several months ago we wrote a blog post called The Evolution of Malware which tracked the development of how cyber-attacks and malicious code have evolved from simple viruses and worms to highly-sophisticated and