New Global OT and Cybersecurity Report Outlines Key Challenges for Industrial Organizations (Fortinet)
Besides providing the latest statistics on the state of OT cybersecurity, the 2022 State of Operational Technology and Cybersecurity Report offers insights on how best to handle OT vulnerabilities and how best to strengthen an organization’s overall security posture.
LinkedIn Still Number One Brand to be Faked in Phishing Attempts while Microsoft Surges up the Rankings to Number Two Spot in Q2 Report (Check Point)
Our research showed that social networks generally continue to be the most imitated category, followed by technology which, this quarter, took over second place from shipping.
How Citrix can help customers achieve zero trust maturity (Citrix)
With the proliferation of remote work, connected devices, cloud computing systems, and access points — how can we keep users safe without impeding their productivity?
Your biggest cyber-crime threat has almost nothing to do with technology
What's important in the battle against BEC (business email compromise) attacks is ensuring that people understand what these attacks are and to have processes in place that can prevent money being transferred.
Ransomware is a highly profitable business for cybercriminals, and easier than ever to pull off with as-a-Service models available all over the dark web. Are you prepared if they decide to come after you? Not sure? Gotham can help you identify any vulnerabilities in your security with our Ransomware Readiness Assessment so you can keep criminals out of your business.
How to Strengthen Your Data Supply Chain (Pure Storage)
Supply chain failures have been making headlines recently, but a flexible, high-performing data supply chain is just as critical for organizations to stay agile and data driven.
Fortinet Unveils New Security Platform To Help Customers Migrate To Cloud (Fortinet)
Fortinet has released a new cloud-native protection offering that it says will make it easier for channel players to help customers migrate to the cloud at their own pace.
Today’s Cyberthreats: Ransomware, BEC Continue to Disrupt (Palo Alto Networks)
Commonly affected organizations are in industries that store, transmit and process high volumes of monetizable information. The finance, professional and legal services, manufacturing, healthcare, high tech, and wholesale and retail industries accounted for 63% of our IR cases.
CrowdStrike and AWS Expand Partnership to Offer Customers DevOps-Ready Security (CrowdStrike)
As cloud adoption continues unabated, adversaries are becoming increasingly adept at finding security gaps to exploit cloud environments.
Hackers and ransomware attacks target Active Directory (AD) because it’s the easiest way into your environment. Find out how Gotham’s AD Security Assessment identifies security risks before your AD environment is comprised.
DaaS and VDI vs. VPN: Which is best for your business? (Citrix)
As organizations embrace remote and hybrid work models, cybersecurity risks grow. According to our latest study on cybersecurity risk perception, nearly 60 percent of surveyed IT leaders are concerned about ransomware attacks and insider threats — and yet 100 percent plan to adopt hybrid work models.
How Threat Actors Are Adapting to a Post-Macro World (Proofpoint)
Threat actors across the landscape responded by shifting away from macro-based threats. Based on Proofpoint campaign data from October 2021 through June 2022, threat actors have pivoted away from macro-enabled documents attached directly to messages to deliver malware...
Today it seems like so many businesses are in the news for all the wrong reasons. Don’t want to be just another ransomware statistic? Check out Gotham’s latest infographic to learn how you can get ahead of ransomware and support your hybrid users with one high-value, low relative-cost solution.
5 Questions to Ask Before Choosing Storage as-a-Service (Pure Storage)
Want to bring agility and simplicity to your data operations? Here are 5 questions to ask before choosing a storage as-a-service solution.
Four IAM Best Practices to Secure Customer Identity (Okta)
Securing customer identities throughout enterprises is no easy task. There is IT sprawl, new employees, newer customers, technology expansion, and files created daily. All these elements make the challenge of securing customer identities and access management increasingly difficult for IT teams.
Smishing vs. Phishing: Understanding the Differences (Proofpoint)
A modern email phishing setup can be as simple as one person with a computer and access to common cloud-hosted services. But for a smishing operation, the picture is somewhat different. While software smishing kits are available to buy on the dark web, accessing and abusing mobile networks requires a little more investment.
Secure SD-WAN: The Foundation for Network Transformation (Fortinet)
As networks continued to evolve, SD-WAN became essential, providing fast and secure access between clouds, clouds and data centers, and as the centerpiece of SASE solutions that extend that same access coupled with security to home and mobile workers.
Check out this brief video from Gotham to see how together, Gotham and Microsoft Azure, can help not only mitigate your chances of becoming a ransomware victim by strengthening your security posture from infrastructure to endpoint but also strengthen your business outcomes by providing your users with an exceptional virtual desktop experience, no matter where they are working from.
Phishing Attacks Skyrocket with Microsoft and Facebook as Most Abused Brands
Instances of phishing attacks leveraging the Microsoft brand increased 266 percent in Q1 compared to the year prior.