SolarWinds Wisdom: 3 Cautionary Lessons & 3 Proactive Defenses

In December 2020, the IT security world was rocked by an announcement from network management firm SolarWinds: they had suffered a devastating cyberattack. With a strain of malware infecting software updates for their Orion platform, a program that provides security for U.S. federal agencies and Fortune 500 companies, SolarWinds faced a breach that put thousands… Continue reading SolarWinds Wisdom: 3 Cautionary Lessons & 3 Proactive Defenses

The Inside Job: Defending Against Your Own

The IT security ideal lets nothing past its cyber-defenses. It recognizes and counters all oncoming attacks with dexterity, resilience, and efficiency. But while much of IT security is focused outward, experts warn organizations should be looking inward—to suss out the insider threat. And survey results agree: today’s IT leaders agree the human element of their… Continue reading The Inside Job: Defending Against Your Own

Cyber Defense ‘21: This Year’s Top 5 Attack Fronts

Stopping and defending from digital pixels flow. Concept of digital world, artifical intelligence etc. 3D rendering

In 2021, IT security can’t just be predictive—it needs to be preventative. It’s no crystal ball, but as IT experts study trends in cyberattacks and consider developments in technology, they can often definitively pinpoint where and how hackers will target their next victims. As important as it is for IT-focused leadership to prioritize accordingly, it’s… Continue reading Cyber Defense ‘21: This Year’s Top 5 Attack Fronts

Engineering Security Solutions For The Human Element

Composition of human head, key symbol and fractal design elements on the subject of encryption, security, digital communications, science and technology

Developing a cohesive IT security strategy can feel like a checklist. Cover all your bases—data security, compliance, vulnerability management—and you’ll be set to address the threats that come your way. But the truth of the matter is that it can and should be more involved than that, especially when it comes to one of IT… Continue reading Engineering Security Solutions For The Human Element

Healthcare Security: 4 Priorities To Drive This Year

The healthcare industry has always been at significant risk for cyberattacks, in part due to the high volume of data it processes. Patient health information (PHI) and identification are in constant demand for identity theft, medical insurance fraud, and other illegitimate ventures on dark web markets. Today, as COVID-19 ravages the globe, the “essential work”… Continue reading Healthcare Security: 4 Priorities To Drive This Year

Ramping Up Ransomware Response

In 2020, ransomware struck hospitals, schools, and state governments across America. In 2021, the Institute for Security and Technology’s Ransomware Task Force (RTF) is striking back. The California-based nonprofit coalition is taking a top-down policy approach to the increasingly prominent threat of ransomware. Though not the latest in IT security nuisances, ransomware is a significant… Continue reading Ramping Up Ransomware Response

On The Edge: Transforming Data Processing

2021 is ushering in a new perspective on IT security. Experts advise the future is in edge computing, but it’s not as simple as “out with the old, in with the new.” With origins in the late 1990s, edge computing is an open IT architecture that operates on decentralized processing power. It cuts out the… Continue reading On The Edge: Transforming Data Processing

5 Key Security Resolutions for Every CISO’s New Year

If 2020 taught us anything, it’s that nothing upends well-intentioned New Year’s resolutions quite like a global pandemic. In an unprecedented year for the world at large, IT security faced its own intense challenges securing a workplace landscape that was evolving at terminal velocity. By the end of Q1, annual strategic priorities fell by the… Continue reading 5 Key Security Resolutions for Every CISO’s New Year

Containing Crises: The SolarWinds Breach

When it comes to a security breach, scope is everything—and the current Solar Winds hack has the government in its crosshairs. It started on December 8th, when cybersecurity incident response firm FireEye announced they had come under attack. Roughly 300 proprietary software tools were stolen, in use by the company and their clients to assess… Continue reading Containing Crises: The SolarWinds Breach

Keeping Up By Going Beyond: Financial Sector Compliance

The financial sector is a high-profile target for cyberattacks, and for good reason. Banks and affiliated networks are hotspots for sensitive data, confidential client information, and, of course, monetary spoils for malicious actors. The good news is that a large number of these breaches are easily preventable. But to prevent them in the first place,… Continue reading Keeping Up By Going Beyond: Financial Sector Compliance