Until early June, it’s likely that the only people who’d heard of Progress Software’s MOVEit file transfer platform were people working in IT departments. Then news emerged that the pla
On May 17, the city of Augusta, Georgia, published a public information tweet of a type that’s becoming increasingly familiar to citizens across the United States: “The City is currently
Sponsored Post: Palo Alto The ever-evolving threat landscape makes it challenging for organizations to be confident in their security posture. In fact, we have seen a 100% year-over-year
In cybersecurity circles, there’s a threat that’s sufficiently feared in which examples of it have on occasion acquired the status of professional legends—the possibility of a lone, rog
Sponsored Post: Palo Alto Maybe its folklore, but evidently there was a time when people could leave their doors unlocked and feel safe. If indeed that was the case, it’s a bygone era for m
An odd characteristic of cybercrime is that it’s almost always disembodied. Crimes are perpetrated by someone out there but precisely who is only rarely made clear. This mystery can confuse
Sponsored Post: Nasuni The greater the leverage, the greater the chance a ransomware attack will prove successful. An attacker gains leverage in two ways. The first is reach. The more operati
Sponsored Post: Palo Alto Global organizations face two major security challenges in today’s business climate: digital transformation and macroeconomic conditions. Let’s address digital t
Many organizations pay ransomware criminals, while anecdotal evidence suggests an increasing number don’t. But until recently, the consensus was that the decision to pay or not pay should b