Category: Featured
Cybersecurity Threat Advisory: Navigating holiday cyber risks
The holiday season is here, and organizations are facing an increased risk of cyberthreats with a notable focus on the activities of access brokers. These threat actors specialize in gaining and selling unauthorized access to organization accounts by orchestrating social...
Tech Time Warp: Kenzero more than Kenough in terms of problems
It was obvious in the late 1990s and early 2000s—the heyday of peer-to-peer (P2P) file-sharing networks—that the concept was too good to be true. In this edition of Tech Time Warp, we will take a look at, aside from the...
Awareness is a tried-and-true cybercrime defense mechanism
I have been writing about cybercrime for years and have witnessed the methodology and tools that criminals use to evolve. One truism about cybercrime is that it knows no boundaries. Unlike conventional crimes, where a criminal is stopped at a...
Protecting your customers’ data in the age of ransomware
There is a cybersecurity paradox in many organizations that MSPs should consider when working with prospects and existing clients. Most companies see cyber threats as their top concern and believe they have implemented sufficient protection and best practices to protect...
Tech Time Warp: Origins of the term “computer virus”
Now, nearly four years since the word “coronavirus” entered the popular lexicon, who doesn’t feel like an amateur epidemiologist? Given world events, it should be easy to understand why Leonard Adleman—the “A” of the RSA algorithm—was inspired by the graduate...
Essential tips and strategies for protecting against ransomware
In September, MGM Resorts faced system outages (affecting hotel room keycard systems and slot machines) and service disruptions at its Las Vegas properties. Caesars Entertainment also reported suffering a data breach that revealed its loyalty program members’ Social Security and driver’s license...
Cybersecurity Threat Advisory: Bibi-Windows Wiper on the rise
Israel has recently been the target of cyberattacks involving a wiper malware that was previously observed to target both Linux and Windows systems. The wiper, named “BiBi-Windows Wiper”, has been used by a pro-Hamas hacker group in the wake of...
The race to deliver managed generative AI services is on
While there is a massive amount of interest in all things relating to generative artificial intelligence (AI), the number of organizations that have the skills and resources required to fully exploit it remains limited. Under the hood of generative AI...
Pioneers in Tech: Gene Amdahl, “father” of mainframe computing
When you walk around with a computer in your hand or on your wrist, it’s easy to forget how much of the world still runs on mainframe computers. In this Pioneers in Tech, we look at how an estimated 10,000...
