Sponsored Post: Paul Ashwood, CrowdStrike Senior Product Marketing Manager, Incident Response When a breach occurs, time is of the essence. The decisions you make on who to partner with and h
We’ve all heard the adage “You can catch more flies with honey than vinegar.” The phrase dates back to 1666, where it appeared as an Italian proverb. However, the principle remains true
I’m a private pilot (although dormant), and used to own my own little plane. It was a fun hobby, until I moved, my mortgage doubled, and I decided I couldn’t afford to own a plane anymore
For most of us, the chance of being caught up in a data breach is just another hazard of online life. Personally identifiable information (PII) is stolen from a company we have an association
Once upon a time, Linux was thought of as being the most secure from ransomware of all operating systems. This reputation stemmed from its relatively low adoption rate when compared to Micros
I recently outlined the many methods of ransomware infection to showcase the ways ransomware can gain a foothold. Cheerscrypt adds yet another: VMware ESXi servers, which many organizations r
The U.S. has a way to cut off funding to some ransomware gangs, and it works—but it’s seldom used. If the U.S. has economic sanctions against a nation (Iran, Russia, and North Korea, for
If you had to name a piece of software cybercriminals look to target, Microsoft’s Exchange Server would surely be near the top of the list. To its huge user base, it’s the perfect DIY in-
With the Russian invasion of Ukraine came the deployment of several destructive malware families, known as “wipers,” against entities in Ukraine, with nine distinct variants observed to d