Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rubrik & Zscaler Announce Industry's First Double Extortion Ransomware Solution

While ransomware continues to be a growing problem, double extortion ransomware in particular has been growing even more rapidly for organizations. Zscaler’s ThreatLabz has found a nearly 120% growth in double extortion ransomware. Double extortion attacks are devastating for organizations because they involve both the encryption of production data as well as the exfiltration of data.

User Management via the Get-ADUser Cmdlet in PowerShell

The Get-ADUser cmdlet in PowerShell provides many parameters for finding one or more users in an Active Directory (AD) domain. By default, PowerShell runs using the account that is logged on to the machine. If you want to run a command using a different account, you can force PowerShell to prompt you for the credentials by using this switch before your command.

EP 26 - Ransomware Revisited: Combating the Identity Explosion

Andy Thompson, Offensive Security Research Evangelist at CyberArk Labs, returns to Trust Issues for a dive with host David Puner into the latest developments in the world of ransomware. With ransomware events on the rise, Thompson sheds light on the alarming trend of data exfiltration and double extortion. But what’s causing this surge? Thompson connects the dots between the rise of digital identities and the increasing frequency of ransomware attacks.

Why Certifications Matter: Experience, Assurance, Mastery and Competence

Certification to International Standards is an essential component of the modern business world. Certification to these standards provides organisations with external validation of their policies, processes and controls but also corroborates their knowledge and skills in key areas.

What is DLP and How Does It Work

Data loss prevention, or DLP for short, is a technology that helps companies protect their data from unauthorized access or theft. It does this by scanning all incoming and outgoing data for sensitive information and then preventing that data from leaving the company's network. In this blog post, we will discuss what DLP is and how it works!

Evolving cyberattack landscape: What to expect in the future

In today’s increasingly digitized world, cybersecurity has become an essential concern for individuals and businesses alike. With more and more data being transmitted and stored online, the risk of cyberattacks and data breaches has never been higher. The field of cybersecurity is rapidly growing and evolving, with new technologies emerging all the time.

Improving your bottom line with cybersecurity top of mind

In times of economic downturn, companies may become reactive in their approach to cybersecurity management, prioritizing staying afloat over investing in proactive cybersecurity measures. However, it's essential to recognize that cybersecurity is a valuable investment in your company's security and stability. Taking necessary precautions against cybercrime can help prevent massive losses and protect your business's future.

BeyondTrust's Morey Haber: The challenges for security operations teams due to identity-based risks in a remote working world

In this episode of the Future of Security Operations podcast, Thomas chats with Morey Haber, Chief Security Officer at BeyondTrust. BeyondTrust is a worldwide leader in Privileged Access Management (PAM), focused on addressing the most urgent cybersecurity challenges, including zero trust, ransomware, cloud security, and more.

More than 1.4 Million Legacy Members of the American Bar Association Have Credentials Stolen

The American Bar Association is the largest global organization of legal professionals in the world and has more than 166,000 members currently. The organization maintains data for a huge number of lawyers and other legal professionals, and this large-scale organization suffered from a recent data breach. The breach released information for over 1.4 million past members of the organization, putting countless users at risk in the process.