There is a definite cool factor concerning the use of honeypots to hunt down an elusive hacker. Deploying a honeypot or two across your network is like creating a spy network within your orga
Ransomware targeting VMware hosts is rapidly on the rise, and Black Basta is one of the latest jumping on the bandwagon. Like most ransomware, this relative newcomer first targeted Windows sy
Sponsored Post: Paul Ashwood, CrowdStrike Senior Product Marketing Manager, Incident Response When a breach occurs, time is of the essence. The decisions you make on who to partner with and h
We’ve all heard the adage “You can catch more flies with honey than vinegar.” The phrase dates back to 1666, where it appeared as an Italian proverb. However, the principle remains true
I’m a private pilot (although dormant), and used to own my own little plane. It was a fun hobby, until I moved, my mortgage doubled, and I decided I couldn’t afford to own a plane anymore
For most of us, the chance of being caught up in a data breach is just another hazard of online life. Personally identifiable information (PII) is stolen from a company we have an association
Once upon a time, Linux was thought of as being the most secure from ransomware of all operating systems. This reputation stemmed from its relatively low adoption rate when compared to Micros
I recently outlined the many methods of ransomware infection to showcase the ways ransomware can gain a foothold. Cheerscrypt adds yet another: VMware ESXi servers, which many organizations r
The U.S. has a way to cut off funding to some ransomware gangs, and it works—but it’s seldom used. If the U.S. has economic sanctions against a nation (Iran, Russia, and North Korea, for