Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Perform Hyper-V Storage Migration: A Step-by-Step Guide by NAKIVO

Hyper-V Storage Migration is Microsoft’s technology for moving the storage of virtual machines (VM) from one location to another without resulting in compatibility issues. Moreover, Hyper-V Storage Migration can be performed on live VMs, allowing you to avoid any downtime and continue business operations as usual. Watch this video walkthrough on how to use Hyper-V Manager and PowerShell to launch and configure Hyper-V Storage Migration.

"Q&A: Digital Threats Landscape" with Joseph Menn

Join us for an insightful conversation with Joseph Menn, veteran cybersecurity reporter for the Washington Post and author of "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World." In this closing keynote discussion, Menn shares his perspectives on the evolution of cybersecurity, exploring the complex relationship between technology advancement and security.

Proactive cybersecurity leadership: Implementing the NIST Cybersecurity Framework (CSF)

According to a recent Gartner report, 88% of boards view cybersecurity as a business risk, not just an IT issue, underscoring the critical need for organizations to adopt robust, scalable frameworks to manage cybersecurity risks. In today’s rapidly evolving threat landscape, frameworks like the NIST Cybersecurity Framework (CSF) are pivotal for safeguarding organizations from vulnerabilities while maintaining alignment with business objectives.

Decoding SEBI's CSCRF: VAPT and Steps to Cyber Resilience

The Securities and Exchange Board of India (SEBI) has raised the bar on cybersecurity with its newly introduced Cybersecurity and Cyber Resilience Framework (CSCRF), effective August 20, 2024. For regulated entities (REs)—including stockbrokers, depositories, asset managers, and alternative investment funds—the framework not only requires compliance but also lays out a clear path toward resilience. These new guidelines require REs to implement VAPT and risk management, among other mandates.

Email Bombing: Why You Need to be Concerned

Over the last few months, the topic of email bombing has been brought to our attention multiple times, mostly queries from customers that go something like this: “I have a few users experiencing some sort of spam attack, where they are receiving thousands of random registration or subscription emails. What do I do, and why is it occurring? Help!” This scenario is known as email or subscription bombing.