Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Michigan Practice Brookside ENT Closes Doors Following Ransomware Attack

The ransomware attack encrypted the computer systems at Brookside ENT and Hearing Center in Battle Creek which housed patient records, appointment schedules, and payment information rendering the data inaccessible. A ransomware attack can prove costly to resolve. That cost was not deemed worth it by one Michigan practice, which has now permanently closed its doors.

What is Ransomware?

So what is Ransomware? Ransomware is a type of malicious program/application that gains access to your files or systems and blocks user access to those files or systems. Then, all files, or even entire devices, are held hostage using encryption until the victim pays a ransom in exchange for a decryption key. The key allows the user to access the files or systems encrypted by the program.

What is the Principle of Least Privilege?

The principle of least privilege (POLP), an important concept of computer security, is the practice of limiting access rights for users, accounts and computing processes to only those needed to do the job at hand. Privilege refers to the authorization to bypass certain security restraints. When applied to people, minimal privilege, means enforcing the minimal level of user rights that still allow the user to perform their job function.

What is a Computer Worm?

A computer worm is a type of malicious software that self-replicates, infecting other computers while remaining active on infected systems. Worms can often go unnoticed until their uncontrolled replication process consumes system resources, halting or slowing the infected computer. Along with computing resources, networks can become congested by traffic associated with worm propagation.

The Future of Cybersecurity Insurance

Cybersecurity incidents and data breaches have become a normal part of the news cycle. It feels like every day you hear about a big corporation or organization suffering an attack that has put customer or user data in jeopardy. Sometimes this is because a security strategy was lacking; sometimes, the criminal’s attack was simply too powerful. Regardless of how or why a cyberattack begins, the fallout can be devastating for all those involved.

Detectify secures 21,5 million in Series B round to bring world-class cyber security to everyone

Stockholm, Sweden. November 26, 2019 – Detectify, today announces a successful Series B round of €21,5 million led by venture capital firm Balderton Capital, and supported by existing investors Paua Ventures, Inventure and Insight Partners. The new funding will be used to continue to hire world-class talent to further accelerate the company’s growth and deliver on Detectify’s promise of a safer internet for all.

Inline Image Scanning for AWS CodePipeline and AWS CodeBuild

In this blog post you’ll learn how to set up image vulnerability scanning for AWS CodePipeline and AWS CodeBuild using Sysdig Secure DevOps Platform. AWS provides several tools for DevOps teams: CodeCommit for version control, CodeBuild for building and testing code, and CodeDeploy for automatic code deployment. The block on top of all these tools is CodePipeline that allows them to visualize and automate these different stages.