Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How to Use Improved Retention | Backup Retention Policy

NAKIVO Backup & Replication offers two approaches to creating a backup retention policy and scheduling: legacy and improved retention. Follow the steps in this video to learn how to create multiple schedules with unique retention and immutability periods within a single backup job using the improved retention approach.

Are Businesses Taking Ransomware Seriously Essential Protection Tips for SMBs

Join Anand Prahlad, CEO & President of Parablu, and Venkatesh Sagare, Co-founder and CTO of Giniminds and Cloudigy, as they discuss the critical issue of ransomware attacks. They explore whether businesses, especially small and medium-sized ones, understand the real threat of ransomware. Venkatesh shares some compelling stats.

Phishing Attacks: The Deceptive Trap

The threat of phishing attacks looms larger than ever. The LA County Department of Public Health recently announced that 50 employees fell victim to phishing attacks, compromising sensitive patient data. These deceptive schemes have become a staple in the cyberthreat landscape, targeting individuals and businesses of all sizes. For every employee, understanding the signs and consequences of a phishing attack is crucial to safeguarding their organization.

Snowflake Breach Attack Insights

The recent attack on Snowflake accounts underscores a critical lesson for all cloud users: securely managing identities and access is paramount under the shared responsibility model. As more organizations leverage cloud services, it’s essential to understand that security is a collaborative effort between the service provider and the customer.

The Real-World Threat of Cyberattacks on Water infrastructure

Do you remember the last time you didn’t have water? Reliable water delivery is something many of us take for granted. Our local water treatment plant sits at the edge of our neighborhood, and I pass it every day on my way to take the kids to school. Not a lot seems to go on there, so it never occurred to me that I should be concerned about an attack on this critical infrastructure. What does occur to me is the possibility of a cyberattack on our water system.

2024 Bitsight Ratings Algorithm Update: Purpose, Observations, and Impact

As our 2024 Rating Algorithm Update (RAU) goes live on July 10, 2024, we wanted to share some research that validates this update and reinforces the importance of the RAU process. As we noted in our announcement blog, after RAU 2024, remediated Patching Cadence findings will impact the Bitsight Rating for 90 days after the last vulnerable observation instead of 300 days.

How to Access Passkeys From Multiple Devices

Accessing passkeys from multiple devices can be a hassle if you don’t use a passkey manager since they’re tied to the device on which they’re generated. This means you’d have to create a passkey on multiple devices or scan a QR code to access a passkey from devices that use different Operating Systems (OS). This is inconvenient, which is why you should consider investing in a password manager to store and manage your passkeys.