There are only 3 fundamental ways to stop attacks from motivated and intelligent adversaries.
Let’s identify and explore those options, and discuss how they may be applied to undermine Ransomware.
This video is the latest installment of a multi-part
There are only 3 fundamental ways to stop attacks from motivated and intelligent adversaries.
Let’s identify and explore those options, and discuss how they may be applied to undermine Ransomware.
This video is the latest installment of a multi-part
The ‘SolarWinds hack’, a cyberattack recently discovered in the United States, has emerged as one of the biggest ever targeted against the US government, its agencies and several other private companies.
About Speaker
Sudhakar is Progressive CEO an
I am honored to join the United Cybersecurity Alliance advisory board. This organization is focused to improve the cybersecurity industry by driving and celebrating equity, inclusion, and equality for a diverse workforce that possesses the skills to
As enterprises battle to conquer the new normal, an old concept of ‘Zero Trust’ has come to the fore. What is zero trust and how pertinent is it for the situation that businesses find themselves? What is the right approach to implement this framework
Once an abstract and futuristic concept, the cloud has now extended its very tangible tendrils into nearly all aspects of the modern enterprise. In fact, the abundance of cloud options that organizations enjoy today has become somewhat of a liability
Creating a long-term plan and introducing new features and products are only one part of the job, for product teams. However, the work doesn’t end even after delivering the products to the customers. You have the responsibility of tracking the bugs a
Yet another good reason to not pay ransomware. Cybercriminals are not trustworthy and they are not your friend. They are looking for easy targets and victims that pay. If you do pay, you are on the preferred list and become a target to every ransomwa
Ransomware risks are skyrocketing with increasing costs, more attacks, and greater impacts that are expanding to affect everyone!
It is a growing threat to organizations and national critical infrastructures connected to the Internet. Ransomware puts
In a recent report from Gartner, External Attack Surface Management (EASM) has been highlighted as a major category in cybersecurity. According to Gartner, EASM is an emerging product set that supports organizations in identifying risks coming fro
1. Internet access monitoring (use free tools available on android/appstore)
In order for children to start using the Internet they must be under the care of an adult. It is not a matter of violating privacy by spying on what they do, but of evaluatin
Now, we all agree that various cloud technologies such as SaaS SIEM help your Security Operations Center (SOC). However, there’s also a need to talk about how traditional SOCs are challenged by the need to monitor cloud computing environments for thr
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …