Kaseya Cyberattack: A preview of things to come?

On July 4th, 2021, a cyberattack occurred that made use of a zero-day vulnerability present in Kaseya software to gain access to a multitude of desktops. The ransomware attack demonstrated a number of new and innovative exploits that are deeply…

Could the Kaseya ransomware attack have been prevented? A Q&A with Chris Roberts of Quest

July 4th, typically a day of celebration full of good drinks, foods, and friends, was marred this year by a successful ransomware attack that utilized Kaseya software as an attack vector. The attack, perpetrated by REvil, targeted managed service providers…

NIST, NSA, DoD, or HHS – which zero trust recommendation makes the most sense?

In May of this year, the Biden Administration released an executive order focusing on cybersecurity that mandated government agencies put a zero trust plan on paper within 60 days. This executive order certainly made headlines within and around the Beltway,…

Is 2021 the year that government agencies finally focus on data privacy?

A number of recent, high-profile data breaches and cyberattacks on U.S. digital infrastructure, networks, and critical infrastructure have made data privacy top-of-mind for the federal government. In light of recent attacks, including the Solarwinds breach, the Colonial Pipeline breach, and…

IBM’s Jason Keenaghan on the rising importance of zero trust cybersecurity

In a year full of high-profile cyberattacks, it should come as no surprise that the zero trust cybersecurity approach has become the standard across both the private and public sectors. The recent cybersecurity-focused executive order from the Biden Administration expressly…

Zero Trust – CrowdStrike’s Andrew Harris shares what it takes to best prepare for the future of cybersecurity strategy

Zero Trust has become a bit of a buzzword in the IT channel and though its foundation is relatively well understood, there exist considerable differences in execution. At its core, a Zero Trust cybersecurity paradigm insists that both parties in…

Supply Chain Attacks and Vaccine Hacking – CrowdStrike Global Threat Report Reveals the New Normal in 2021

The recently released CrowdStrike 2021 Global Threat Report (GTR) provides a stark but comprehensive outline of the ongoing threat landscape facing modern cybersecurity professionals. Hot off the heels of, “a year of hardship and grief for many,” CrowdStrike’s annual report…

The newest tools in the terrorist toolbox: cyberattacks and cyberwarfare

When we think about America’s adversaries in cyberspace, we think of large, near-peer nation-states with sophisticated militaries’ incredibly capable cyberwarriors at their disposal. We think of countries like Russia, China, and North Korea. But the threat against America extends beyond…

Coronavirus cyber considerations – six key factors for securing a remote workforce

With more than 4,000 reported cases, and many more anticipated by health and infectious disease experts, the Coronavirus (COVID-19) has many Americans changing their behavior, stocking up on necessities and quarantining themselves in their homes for fear of contracting the…