Resource Library
Make sure your organization is prepared
Colonial Pipeline ransomware attack fallout, President Biden’s executive cybersecurity order, triple extortion, Truist Bank spear-phishing campaign, AXA Insurance becomes victim
1. Congress introduced two bills in the wake of the Colonial Pipeline ransomware attack Following the recent ransomware attack against Colonial Pipeline, which caused gas shortages in several states, the U.S. Congress introduced two bipartisan ...
5 Top Takeaways from the IT-Security Paradigm Shift Panel Discussion
Real-world advice on covering the fundamentals of IT security with upper management, and how automation and AI have a crucial role to play in reducing cybersecurity risk.
Hackers Target EDR Tools, Nuke Account Spouts Gibberish, Ransomware Labelled National Security Threat
Threat actors find ways against common endpoint security tools, US government classifies ransomware as a national security threat, an unattended government agency Twitter account that is responsible for US nuclear arsenal tweeted gibberish, a deluge of tools is actually making it harder for IT teams to assess their network's security and PHP’S ‘Git’ server compromised to add Backdoors to PHP source codes.
Less Than 25% of New IT Tools Meet Security Goals, Office365 Scams, New D/TLS, Purple Fox, REvil Hacks | aiden IT Security News
Survey finds IT teams are over-burdened with tools that don't fully meet security goals, financial phishing attacks imitate Office365 and researchers discover new D/TLS, Purple Fox, REvil ransomware hacks.
10 Benefits of IT Automation
Lighting fast compliance, robust vulnerability and patching management, and fewer IT support tickets are just a few of the benefits you can expect by empowering your IT teams with automation.
Kia Motors Hack, California DMV Data Breach, Morse Code Phishing Campaigns – Cybersecurity News and Trends
1. Kia Motors Suffers a Ransomware Attack, and a $20 million Ransom is Demanded The notorious ransomware gang, DoppelPaymer, has seized critical systems belonging to Kia Motors America. Thus, impacting business continuity within 800 dealerships; ...
7 Ways Hackers Will Steal Your Data Using Advanced Automation
Hackers are using automation to outsmart anti-virus programs and hack into network systems at unprecedented speed and scale.
Poor Patching Put Businesses At Risk, China Has Stolen Your Data, SolarWinds Hack legal changes – Cybersecurity News and Trends
New data shows slow or ineffective software patching leads to more than a quarter of cybersecurity vulnerabilities, Evanina: Chinese government has stolen 80% of personally identifiable US consumer data, threat actors now targeting supercomputers, US federal, legal agencies told to file paper documents, and new ransomware encrypts virtual disks using VMWare vulnerabilities .
Security by Design: Advocating for a Security-first Software Paradigm
Making security a part of the software design process, using frameworks like Zero-Trust, is needed to counter today's cybersecurity threats.