With the growing frequency of cyberattacks comes the need to develop improved identification and response times to potential threats. One particular client I worked with had recently been a victim of a DDoS attack. Then it happened again, and again
It has recently surfaced that thousands of devices have been compromised, thanks to a vulnerability in Teamviewer. Although poorly suited to secure environments, Teamviewer and related software have gained a foothold in "shadow IT" efforts, as well as in organizations where users have administrative privileges.
In order to fully secure a banking system banks must ensure that their messaging and transactional systems are fully secured and maintained. However, according to a Reuter’s report, small banks are well behind the curve in securing SWIFT terminal communications, leading to a number of
The Reserve Bank of India (RBI) was an eye opener of sorts in June 2016. According to Palo Alto Networks, the RBI sent a document to Indian banking CEO’s, urging banks in India to implement strong cybersecurity controls and to ensure that these controls were
How Varonis Is Solving the Problem of Insider Threats to Business Cyber Security: Part 1
There are many organizations that assume that hackers and viruses are to blame for most cyber breaches,but the reality is that your own employees, whether accidentally or maliciously, are actually the
As the number of reported cybersecurity-related incidents grows in frequency, regulators from different industries have been focusing on the role and responsibilities of the Board of Directors. According to a paper published by the Institute of Internal Auditors Research Foundation, "Directors should understand the legal
The increase and sophistication of cyber-related attacks has raised a new level of awareness and the need to strengthen cyber security controls. According to the Verizon’s 2015 Data Breach Investigations Report (DBIR), the Financial Services sector was one of the top three industries most affected
By Kevin Vogl
I was one of 23,000+ attendees at VMworld last week in Las Vegas, NV. This is my 12th time attending and it was as hectic as usual, and had fewer announcements of new products than in past years. However, VMware focused on three
By Jack Bornhoft
Is your virtual data footprint growing rapidly—or are you expecting to have a growth spurt in the near future? Then it’s time to think about scale. Now, scaling compute is relatively friction-free, but scaling storage on the other hand can be a challenge.
Clint Wyckoff, Veeam’s Microsoft Cloud & Datacenter MVP, reveals how Veeam can enhance your cloud strategy
At Champion / MessageOps, we’re a big advocate of Veeam, a software provider dedicated to helping organizations meet recovery time and point objectives (RTPO™). We sat down with Clint Wyckoff,
The world of PCI compliance is a daunting one for those of us in the industry. The litany of regulatory concerns that affects how we handle both our internal and external customers complicates and adds further considerations to IT infrastructure projects as well as any
When every employee has a company’s information in their pocket or purse, every misplaced smartphone represents a risk for small and medium businesses. Security products vendor Kensington recently disclosed that each year, 70 million smartphones are lost. Only 7% are ever recovered. 4.3% of company-issued