By Tony Cole, CTO, Attivo Networks Will the SolarWinds breach finally prompt the right legislative and regulatory actions on a broader, more effective scale? The SolarWinds breach is not the first major supply chain breach, but previous similar breaches failed to prompt effective regulatory action. Both governments and businesses remain focused on things like cyber …
Written by: Venu Vissamsetty, Vice-President of Security Research – Cyber Hygiene relates to the practice of keeping data safe and secure within the organization network. Organizations across the world are moving towards deploying IoT devices, adopting cloud computing as well as growing usage of applications which require additional access controls and password management.
In a recent security incident, attackers gained access to an organization’s network through a compromised external user system and targeted a Raspberry Pi computer that was not authorized to be attached to the network.
The attack highlights the significance of cyber hygiene and best practices to follow.
Authored by: Carolyn Crandall, The new year is upon us, and the need for comprehensive cybersecurity is as strong as ever. As threats that continue to evolve and expand, it is critical that organizations prepare for the future with a plan to address the most vulnerable aspects of their threat detection and response strategies. Breaches are already making headlines in 2019, and organizations are increasingly looking for ways to shift the balance of power away from the attacker.