Log4j Vulnerability Fix: Comprehensive Log4Shell Resources

Heading

Learn about the Log4j vulnerability, including resources, updates, and mitigation steps to protect your systems.

How to NOT pay ransomware and live to tell the tale

Heading

Ransomware is out of control. So, what can organizations actually do to deal with this tidal wave of attacks? It’s time for organizations to ask themselves the question, “Are we ransomware ready?” And then think about what ransomware readiness really looks like.

Can vulnerabilities in on-prem resources reach my cloud environment?

Heading

What risk does this Zoho password manager vulnerability present, and could this on-prem vulnerability impact cloud environments as well?

Lacking readiness, massive Twitch.tv breach may be a win for competitors

Heading

What seems clear now is that Twitch simply wasn’t ready for an attack. Twitch claims that this latest incident was “a result of a server configuration change that allowed improper access by an unauthorized third party.”

Patches are not enough for VMWare vCenter Server and Cloud Foundation vulns

Heading

New vulnerabilities emerge and get published frequently, and merely applying patches is insufficient. Learn how to safeguard your data beyond just patching.

Learn how ransomware attacks have changed — and how incident response must, too

Heading

Ransomware keeps hitting the news these days, filling headlines with stories about organizations struggling with disabled IT systems, inaccessible patient data, unavailable Wi-Fi, and general confusion. Today, organizations are facing an evolving threat, modern ransomware, also called double extortion ransomware.

Golden Time During Cloud Transitions

Heading

In cloud transitions, the goal is move business processes from an on-premises environment to a cloud-based environment. Inevitably, as the transition progresses, some business processes are fully transferred while others are still in flux. It’s during this transition period that organizations are at risk.

Viral Outbreaks: Thinking of Microsoft’s New Wormable Vulnerability in a Coronavirus Context

Heading

But today, in the midst of a pandemic outbreak of Coronavirus (COVID-19) and while governments and global organizations work to contain and eradicate the virus, we’re hearing of a new wormable vulnerability in Microsoft’s SMBv3 protocol.How can we learn from these unfortunate events to provide us with a different context and an opportunity to rethink our level of readiness for unexpected, viral cyber events?

Customer Advisory Kaseya VSA Ransomware Incident

Heading

Kaseya, an IT management software provider, notified its customers of a possible security breach in the Kaseya Virtual System Administrator Product. Kaseya has indicated that the number of victims is around 1000s, though the number may increase, at least 36,000 Kaseya customers took their servers offline.