Blog

Stay up to date on cybersecurity

BLOG
Cloud platforms such as Amazon Web Services (AWS) have transformed how we do business. They allow organizations access to highly scalable and flexible computing architecture for a fraction of the cost of a fully in-house solution. However, as organizations migrate to the cloud with record speed, security sometimes falls by the wayside. The complexity of […]
Tagged under: , ,
You can’t understand modern cybersecurity without a good grasp of attack paths. With that said, let’s take a closer look at why attack paths are so important for defenders and the best way to manage them. Understanding Attack Paths and Attack Surfaces An attack path combines a chain of vulnerabilities, misconfigurations, overly permissive identities or […]
Hybrid Cloud Security Best Practices
Hybrid cloud computing is a “best of both worlds” approach made up of on-premises infrastructure, private cloud services, and a public cloud – such as Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP) – with orchestration among the various platforms.¬† Additionally, from a pure security perspective, hybrid cloud setups can also allow […]
Sisyphus, a famous king from Greek mythology, was known for being crafty. He cleverly used deceit and trickery to twice cheat death. Zeus and the rest of the gods, however, were not amused. They decided to punish Sisyphus by forcing him to roll a boulder up a hill. Every time Sisyphus neared the top, the […]
Here‚Äôs something that should send a shiver down the spine of cybersecurity professionals and business leaders: The odds say that your organization will be victimized by a ransomware attack in the next 12 months. In 2021, the global ransomware victimization rate for businesses reached 68.5-percent, according to Statista. This is the highest figure in history. […]
Double extortion ransomware attacks are now one of cybersecurity’s most pressing threats. Read this to learn how organizations can make the right moves to protect their most sensitive assets. Ransomware attacks have long been viewed as a worst-case cybersecurity scenario for organizational leaders. Sadly, that doomsday scenario is now becoming reality with alarming frequency.¬†In 2021, […]
By providing critical attack-centric context, XM Cyber helps extend the power of Tenable‚Äôs cyber exposure platform Like peanut butter and jelly, some things are good in isolation but great when they are combined. In the world of cybersecurity, joining the power of two advanced technologies together often delivers similar improvements. By integrating one platform into […]
If you aren’t worried about ransomware, you should be. And if you are worried, you probably are not worried enough. According to Verizon’s 2021 Data Breach Investigation Report, ransomware attacks have doubled in the last 12 months.¬†Cybercrime Magazine, meanwhile, predicts that a new ransomware attack will occur every 11 seconds in 2021, with global financial […]
Tagged under: ,
The asymmetrical nature of cybersecurity (defenders need to be perfect, attackers only need to be right once) makes the job of critical data asset protection a tough one. Sadly, many organizations make this task even¬†more¬†difficult by unwittingly giving hackers the “keys to the kingdom.” Despite spending precious time and resources trying to stave off attacks, […]
No three words send shivers down the spine of cybersecurity leaders more than “successful ransomware attack.” This is for good reason — few cyber-crimes possess the same power to utterly paralyze business operations and force victims into a situation where the optimal outcome is usually the “least terrible” one. Here’s the bad news: According to […]