Tag: ransomware

Security Services

Spotlight: Is There A Cure For InfoSec’s Headcount Headache?

In this Spotlight Podcast, Lyndon Brown, the Chief Strategy Officer at Pondurance joins host Paul Roberts to talk about how changes in both the threat landscape and the workplace are driving demand for managed detection and response (MDR) services, in which companies hire outside security talent to help keep sophisticated cyber adversaries at bay.

A public school computer offline because of ransomware

Episode 223: CISA Looks To Erase The Security Poverty Line

In this week’s episode of the podcast (#223), we are joined by Josh Corman and Lisa Young of the COVID task force at CISA to talk about the agency’s work to improve the security of critical sectors of the U.S. economy. Job #1: erase the so-called security “poverty line” that keeps small, poorly resourced firms from obtaining the skills and talents they need to protect their networks, data and IT assets.

Russian Hacker Concept

Connecting The Dots: The Kremlin’s Links to Cyber Crime

The question of whether or not Russia has been involved in ongoing cybercrime is on the minds of many. A new report by Analyst1 offers new intelligence on the matter.

Pride Summit 2021

At Pride Summit: A Warning On Cyber Literacy

Poor cyber literacy is at the root of many of the cybersecurity problems plaguing the U.S. economy, according to Dr. Alissa Abdullah, Deputy CSO at MasterCard.

Cartoon of Man Staring at Monitor

Episode 220: Unpacking The Kaseya Attack And Securing Device Identities on the IoT

In this episode of the podcast, sponsored by Trusted Computing Group we dig deep on this week’s ransomware attack on the Kaseya IT management software with Adam Meyers of CrowdStrike and Frank Breedijk of the Dutch Institute of Vulnerability Disclosure. Also: Tom Laffey, a product security strategist at Aruba, a Hewlett Packard Enterprise firm, and co-chair of the Network Equipment working group at TCG about how that group is adapting its technology to make it easier for new generations of connected devices to attest to their integrity.