A Tale of Two Ransomware Attacks: Which Company Are You? (Pure Storage)
Ransomware attacks became a matter of not “if” but “when,” with experts predicting a ransomware attack every 11 seconds in 2021. Sophisticated cybercriminals continue to prey on vulnerabilities, and victims are giving in to demands and handing over cash to retrieve their encrypted data.
FBI Internet Crime Report Shows that Email Fraud Represents the Largest Financial Losses in 2020 (Proofpoint)
The report reveals that victims of cybercrime reported 791,790 complaints with a total loss of $4.2 billion for the year—an increase of more than 300,000 complaints (up 69.4%) and $700 million reported losses (up 20%) for 2019.
The journey to Citrix Workspace and the value along the way
The great news for Citrix customers is that regardless of where they start their journey, they realize tangible value at every milestone along the way.
Keeping Edge Computing Secure (Fortinet)
Today’s networks are far more distributed and complex than ever before. In particular, the shift to cloud and hybrid networks made traditional leased line networks used for routing traffic back to data centers less relevant.
Citrix and IGEL can help organizations of any size to better connect your people to their desired apps, desktops, and cloud workspaces – from anywhere. Join us on Thursday, April 8, at 11:00AM when Jesse Fasolo, Director, Technology Infrastructure and Cyber Security at St. Joseph’s Health discusses his transition to Citrix and where he sees Cloud technology and the workspace going in the years to come. Click the link below for registration details.
Planning for the Unknown (Pure Storage)
From the beginning we have been modernising the fundamental IT infrastructures that enable organisations of all shapes, sizes and business models to achieve rapid agility. Not once, but fluidly, whenever they need it, so that the lifeblood of digital transformation—data—is available to drive business change in every way possible.
Active Directory Security Assessment
Gotham has developed an Active Directory Security Risk Assessment offering to provide specific actionable guidance to mitigate security risks in your Active Directory environment.
CISA and NSA: The Times, They Are A-Changin.’ Identity is Everything Now (CyberArk)
But one thing everyone can agree on is that traditional security approaches – which have failed to change with the digital times – are in dire need of an overhaul.
Back in a Bit: Attacker Use of the Windows Background Intelligent Transfer Service (FireEye)
When malicious applications create BITS jobs, files are downloaded or uploaded in the context of the service host process. This can be useful for evading firewalls that may block malicious or unknown processes, and it helps to obscure which application requested the transfer.
The Ransomware Threat: Bigger, Greedier, Attacking the Most Vulnerable (Palo Alto Networks)
Using data from Unit 42, as well as from our Crypsis incident response team, the report details a disturbing new watershed: Cyber extortion has reached crisis levels as cybercriminal enterprises have flourished.
Vulnerability Roundup: 10 Critical CVEs of 2020 (CrowdStrike)
One lesson from 2020 is clear: Patching security holes must be a high priority for security operations teams throughout this year and beyond. While the newest vulnerabilities often get the most media attention, attackers frequently look for low-hanging fruit such as older, easier-to-exploit vulnerabilities that exist in widely used systems and applications.
State of Application Strategy: Evaluating Seven Years of IT Priorities (F5)
Every year the top application security and delivery technologies planned for deployment indicate the strategic priorities of the coming year and how organizations are progressing through digital transformation.