Next generation intrusion detection systems (IDS) are now integrating detection, investigation and response capabilities. It’s a step in the right direction, but still present a sizable and insurmountable gap in effective attack detection.
Tags: cybersecurity, intrusion detection
As an IT security professional, you must be hyper-aware of all the possible types of cyber attacks to your network and your...
Tags: cyber attack, cybersecurity, ransomware,
A closer look at ransomware: what is it, why is it so devastating, and why aren’t we doing a better job at preventing it? This...
Tags: cyber attack, cybersecurity, data protection,
How did the recent Colonial Pipeline cyber attack happen? What could have been done to prevent it? A closer look at the most...
Tags: cyber attack, cybersecurity, ransomware
While past blogs focused on the initial cyberattack involving Microsoft Exchange Server, this follow-up article takes a much...
Tags: cyber attack, data breach, cybersecurity,
Most everyone agrees that 2020 was a loss-leader of a year.
Tags: cyber attack, data breach, cybersecurity,
Today at GTC NVIDIA announced their NVIDIA Morpheus cybersecurity application framework, as well as the general availability of...
Tags: cyber attack, cybersecurity
It’s been approximately 100 days since the disclosure of the attack on the SolarWinds Orion platform, and we are in a better...
Tags: cyber attack, data breach, cybersecurity,
As we’ve previously discussed, traditional threat detection tools and resources can’t reliably identify cyber attacks. This is...
Tags: cyber attack, data breach, cybersecurity
In this blog, we’ll review the details of the most recent breach against the Microsoft Exchange Server. However, this blog’s...
Tags: cyber attack, cybersecurity, ransomware,
Enter your email address to subscribe to this blog and receive notifications of new posts by email.