Infosecurity Blogs
How to Repair Corrupt Exchange Database using the EseUtil Tool
In this article, we explain the six steps to repair a corrupt Exchange database
Ransomware – Three Questions to Ask Your Cybersecurity Teams
When it comes to cybersecurity threats, there are three essential questions to ask to determine how prepared you are for a ransomware attack.
Tales From the SOC: Dealing with the Dangers of Freeware
AT&T's SOC team highlight the dangers of downloading freeware
Embrace your Business Reality with a Strong Hybrid Cloud Strategy
Whether fully cloud native, in the middle of a migration process or beginning the move, several benefits come from implementing a solid hybrid cloud approach
Top 5 Data Breaches in History
The biggest, strangest and most embarrassing data breaches in history
Ransomware: Why it is on the Rise, and How Can Companies Respond?
A zero trust approach and isolation technology are key to preventing ransomware infections
Top Five Hacking Portrayals in Movies and TV
What have been the best portrayals of hacking in TV and films over the years?
How Much Do Hackers Pay for Stolen Personal Data on the Dark Web?
Privacy Affairs investigated how the dark web market has changed and adapted since 2020. Here are some of their findings:
5 Ways to Stop Ransomware in its Tracks
There are several key measures organizations can take to stop ransomware attacks in their tracks
Why Cloud Architectures and Configurations are Like Eating Pizza and Building Lego
Migrating to the cloud can be full of promise, but organizations should understand what’s required in their slice of the cloud pie
Top 5 Mobile Device Security Tips
What five steps should organizations take to secure their employees’ mobile devices?
Zero Trust for Insider Access
Insider access has emerged as a new threat. Implementing components of zero trust architecture can prevent internal attacks and protect networks and systems
Best Practices for Securing Your APIs
API breaches are on the rise and are having a dramatic impact on businesses. Organizations should follow four best practice steps to protect APIs
The Next Equifax Attack...That Never Happened
Although a cyber-attack similar to the infamous Equifax breach was thwarted, it shows the urgent need to address digital supply chain security
Tailored Administration: A Catalyst for Zero Trust Architecture
Zero trust architectures are important, but implementation issues persist. Fortunately, a tailored, custom administration can make it achievable
The Rise of Initial Access Brokers
How can orgs protect themselves against initial access brokers?
Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study
OCTO Telematics CISO, Attilio De Bernardo, explains how his organization uses an integrated management system and certification to improve its security posture
Linux-based Malware Requires Linux Focused Cybersecurity Strategy
Trend Micro's Erin Sindelar considers the Linux-focused cybersecrity strategy needed to tackle an increase in Linux-based malware
Creating a Secure Solution Development Lifecycle for Healthcare
What is SSDLC and can this enhance the security of healthcare organizations?
The Rise of Device Encryption
Company-wide encryption of data is being increasingly recognized as a straightforward way of mitigating the risk of data breach