by Jon Rubin | May 13, 2021 | Breaches, Critical Infrastructure
The Colonial Pipeline ransomware attack exposed long-standing vulnerabilities in U.S. cybersecurity: the government and private sector have struggled to work together to build more resilient defenses, and outdated security models have made it difficult for the federal...
by Pete Slade | Apr 5, 2021 | Supply Chain Threat Detection
The Cybersecurity and Infrastructure Security Agency (CISA) is partnering with the Office of the Director of National Intelligence (ODNI), the Department of Defense, and other partners to recognize April as National Supply Chain Integrity Month and promote a call to...
by Pete Slade | Mar 4, 2021 | Breaches, Supply Chain Threat Detection
The SolarWinds attack was a pivotal moment for cybersecurity, proving that sophisticated threat actors could breach an organization through their trusted security supply chain. (1) The recent Qualys attack — in which cybersecurity firm Qualys suffered a data...
by Rob Lancaster | Dec 10, 2020 | Best Practices, Cloud Security
Many enterprises today are built on a hybrid or multi-cloud architecture, and the rising demand for cybersecurity solutions that can protect these cloud infrastructures has grown exponentially. However, some vendors still focus security efforts only on certain...
by Jon Rubin | Dec 8, 2020 | Machine Learning
We’ve all heard the buzzwords – artificial intelligence, machine learning, supervised and unsupervised neural networks, network detection and response, etc. – flying around the tech industry. In the world of IT, there’s never a shortage of these buzzwords, but they’re...