Implementing Vulnerability Management Programs is Still Challenging for Many Companies – Part 1
We’ve written considerably on Vulnerability Management, Vulnerability Assessments, and Patch Management because they are critical to preventing cyber attacks. I’ve provided links to several of the most-read blog posts we
Protecting and Responding to Ransomware Attacks – A Best Practice
Let’s start with the basics: ransomware, a malicious software, poses a significant threat to organizations by encrypting their data and demanding payment for its restoration. This type of attack disrupts
DDoS Attacks on Critical Infrastructure: A Look at Hydro-Québec’s Website Outage
Recently, the critical infrastructure of Canada has once again become the target of cyberattacks. Pro-Russian hacking groups have launched a series of DDoS or denial of service attacks, causing operational
Cybersecurity vs. Cloud Security: What is the Difference?
Regarding technological advancement, cyber and cloud security are critical elements that can either make or break a company's overall IT infrastructure. Cybersecurity analysts must understand both nuances to protect their
‘BlackMamba’ AI-Keylogging Malware Attack Is Here – What You Need to Know
A new strain of malware has been discovered that is powered by artificial intelligence, and it's already making headlines in the cybersecurity community. Dubbed "BlackMamba," this keylogging attack has the
The Indigo Bookstore Ransom Cyber Attack – Lessons Learned
The recent attack on the Indigo Bookstore left many cyber security analysts scratching their heads. How did attackers seize control of systems through ransomware, and how was a zero-day exploit
Will Your Organization Benefit from Security Services Edge (SSE)?
We want to keep things as simple as possible in this post about Security Services Edge (SSE); that is, what is SSE, what are the components, and what SSE is
Organizations Struggle Implementing Compliance Requirements Including NIST & Zero Trust Mandates
Over the last year, we’ve seen a literally flood of government legislation and formal guidance concerning cybersecurity best practices. New mandates have been coming or to the cyber community fast
Two-Thirds of Organizations Were Hit by a Ransomware Attack Last Year
In SpyCloud’s Ransomware Defense Report, its annual survey of CISOs or Chief Information Security Officers and heads of IT security from Canada, the UK, and US they found that that
How CASB Solutions are Improving Cloud Security
Cloud access security brokers (CASBs) are on-premises, or cloud-based security policy enforcement points, typically placed between cloud service consumers and their cloud service providers (CSB). The solutions often combine and