Home Search
solarwinds - search results
If you're not happy with the results, please do another search
4 Immediate Measures to Execute After a Cyberattack
Whether it is a global pandemic or the new normal, cybercriminals always find ways to target organizations and individuals for valuable digital assets. Most...
Supply Chain Attacks is APAC’s Biggest Application Security Challenge: Barracuda
For modern businesses, application security has become an essential concern. Every organization uses a triage of web, software, and mobile applications to serve customers...
Fujitsu’s “ProjectWEB” Stands Suspended Amid Japanese Government Hacks
Just a couple of weeks ago, fearing a repeat of the Colonial Pipeline-like hack, Japan had announced stringent regulations for critical services in the...
U.S. Introduces Security Bills to Secure Critical Infrastructure
Organizations globally continue to suffer cyberthreats from various cybercriminal groups. Most enterprises have increased their cybersecurity budget to boost their security capabilities against evolving...
3 Takeaways from 2020 for CISOs to Guide This Year’s Strategy
Last year cast a shockingly bright spotlight on cybersecurity with the risks that surfaced due to the rise of remote work. The year was...
Joe Biden Strengthens U.S. Cyber Defenses by Signing an Executive Order
The U.S. has been under cyberattacks for over a year now. It started with a persistent SolarWinds attack, which was discovered in December 2020...
Supply Chain Security – A CISO Point of View
Recent news about the SolarWinds compromise and Trojan horse introduced in their software raises a question: How can organizations ensure the security of their...
In IT Security, All Roads Lead to Identity
The increasing use of cloud services and automation solutions or even the switch to remote work has made identity the new perimeter security. With...
Biden’s 100-Day Plan to Enhance Electric Grid Security
With the rising cybersecurity incidents in the U.S., the Biden administration is focusing on elevating the country’s security strategy to protect its critical infrastructure...
Justice Department to Launch Ransomware Taskforce
Ransomware operators continue to innovate hacking techniques to encrypt victims’ sensitive information and demand ransom or threaten targets of leaking their data online. Besides...