Who are the people the ransomware groups most rely on for their business model? Most commentators fall back on the conventional view that the ransomware industry’s main protagonists are the
Sponsored Post: Nasuni. As we enter week four of National Cybersecurity Awareness Month (NCSAM), it’s worth making the connection between ransomware and your overall business continuity str
Sponsored Post: Nasuni. As we all know, it is very difficult to protect large file servers using traditional backup solutions. Organizations have been founded with the sole purpose to create
Imagine a world where ransomware victims across the globe simply refused to pay their attackers. In theory, the attackers would quickly realize their extortion business model no longer made a
Spend any time studying official cyberattack disclosures and two words that crop up with striking regularity are “sophisticated” and “targeted.” Every attack is said to be sophisticat
Initial Access Brokers: Who Are They? It’s not often that we get to peer deeply into the structure and organization of cybercrime, gaining insights beyond the superficial damage we witn
Sponsored Post: Nasuni. Ransomware is everywhere: According to Enterprise Strategy Group (ESG), 73% of organizations have been the victim of a successful ransomware attack that resulted in fi
Sponsored Post: Palo Alto Networks. One of the most impactful cybersecurity strategies an organization can employ is the use of tabletop exercises. These simulated ‘what-if’ scena
Sponsored Post: Nasuni. File backup is broken and no one is talking about it. The most recent uptick in ransomware attacks has exposed a fallacy that the industry has been supporting and re-e