31,000 potential targets – OU’s CISO describes the herculean task of protecting university networks

With an enrollment of approximately 31,000 young people – all raised on new technologies and clearly digital natives – you would think that a large university like the University of Oklahoma (OU) would have no problem keeping its networks and…

James Yeager Lays Out the Fed and SLED Threat Landscape in Advance of Fal.con for Public Sector

You would think that – in the midst of a global pandemic that is confirmed to have killed almost 500,000 people worldwide – that the healthcare organizations working to find a cure would be able to conduct their work and…

Ransomware Observations from 2019: The Greedy Get Greedier

Global endpoint security provider CrowdStrike recently released its much-anticipated annual Global Threat Report, which details the most significant cybersecurity events and trends of the past year. The report is compiled with details and information from the CrowdStrike Intelligence team, the…

Coronavirus cyber considerations – six key factors for securing a remote workforce

With more than 4,000 reported cases, and many more anticipated by health and infectious disease experts, the Coronavirus (COVID-19) has many Americans changing their behavior, stocking up on necessities and quarantining themselves in their homes for fear of contracting the…

Three key DDoS findings from the NETSCOUT Threat Intelligence Report

While the seemingly increasing rash of ransomware attacks impacting government organizations and entities has dominated much of the news cycle, there is another threat that is less trendy but equally harmful to government organizations. That threat is the Distributed Denial…

Six cybersecurity trends to watch in 2020

Earlier this month, global endpoint security provider, CrowdStrike, released their Services Cyber Front Line Report. This year’s version of the report looks at key cybersecurity trends and themes that the company observed while responding to and remediating the global threats…

Mobile devices – convenience, security risk or both?

Cell phones, tablets, wearables and other mobile devices dominate our lives. I personally bring my trusty iPad to everywhere, and, like everyone else, have my phone with me at all times. The biggest attack surface for any enterprise, then, may…

Mid-Year OverWatch Report finds ransomware and phishing on the rise in 2019

In a trend that many that have been watching the news may not find a surprise, in the first half of 2019, ransomware attacks and phishing attempts are continuing the rise in popularity that they enjoyed in 2018. Much of…

Phishing – why humans are the biggest security vulnerabilities

Phishing, vishing, whaling, spear-phishing: the list of clever new terms seems constantly to change. A successful attack by any other name, though, is just as sweet to the adversary. Terminology aside, the fundamental problem is this. Phishing is the most…

Ten steps to avoiding ransomware

Recently, 22 different cities across the State of Texas were hacked and hit with simultaneous ransomware attacks – attacks where computer systems or data are effectively held hostage for a monetary ransom. And Texas isn’t the only victim. According to…