Posts Tagged ‘Cybersecurity’
Scary Cyber Attacks in 2022 and the Driving Forces Behind Them
It’s no secret that cyber crime has grown tremendously over the past few years. Unfortunately, malicious actors have taken advantage of (and sometimes caused) social upheavals around Covid-19, elections, economic instability, and war. Throughout all of these challenges people have spent a lot of time online, and a lot of business has been done there too—it’s a…
Read MoreWith $165B in Assets Under Management Zero-Trust is The Way
State investment board chooses Infused Innovations to deliver a full zero-trust portfolio, protecting identities, devices, data, and delivering threat protection.
Read MoreThe Most Common Cyber Threats to Be Aware Of
Cyber crimes are all over the place. Hackers are just waiting to make a big profit off of vulnerable parties, devices and networks. Every organization needs to be on guard for attacks that will inevitably occur. Small- and medium-sized businesses in particular are often prime targets, and they’re usually not prepared for what’s coming. Since…
Read MoreIntegrate External Attack Surface Management (EASM) with Microsoft Sentinel
RiskIQ, an External Attack Surface Management (EASM) company that Microsoft acquired last year, helps customers assess and monitor all of their areas of potential attack across their enterprise. This covers not only endpoints but also multiple cloud environments, SaaS platforms, and in the supply chain as well. It identifies vulnerable assets, remediating them before attackers…
Read MoreMicrosoft Defender for Cloud: the Only Offering that Natively Supports Azure, AWS, and Google Cloud
The three largest cloud infrastructure providers are Amazon Web Services (AWS), Microsoft Azure, and Google Cloud (in that order, according to market share). They each offer an array of capabilities and conveniences—on top of data storage, customers can use them to build applications, run projects, track analytics, and more. Many customers, especially enterprises, have aspects…
Read MoreAzure Firewall Basic Geared Towards Small and Medium Sized Businesses
Firewalls have long been a first line of defense for network security. The barrier that they create between internal and external networks acts as a sort of living fortress wall, monitoring the traffic and deciding what to let in. A firewall can take the form of hardware or software—and in the case of Azure Firewall,…
Read MoreMicrosoft Defender for Endpoint and Intel TDT Combine for a New Ransomware Defense
Ransomware continues to be a growing and evolving threat. As some cyber attackers become increasingly sophisticated, things like ransomware kits allow even hackers with a low level of skill to take part in this malicious activity. With relatively little investment, they end up reaping big gains. And once that happens, they have all the more…
Read MoreFacts and Misconceptions About Zero Trust
Cybercrime reports have gone up over 300% in the last couple years. And a surprisingly large number of breaches happen with company employees involved, often because of mistakes like falling for phishing baits. Any insider in the company can potentially be a point of vulnerability that can expose the whole network. That’s why a Zero…
Read MoreCyberattacks in 2021 Doubled Those of 2020
If 2020 was the year of Covid chaos, 2021 was the year of cybercrime explosion. Of course, both of these roller-coaster years were much more complicated and neither can be summed up in one simple term like that. But it’s true that cyberattacks have risen dramatically this year, making even 2020 look tame in comparison.…
Read MoreMITRE D3FEND and Azure Mappings: Counteracting ATT&CK Methods
Whenever I read about MITRE ATT&CK and D3FEND, a part of my brain goes, “[email protected]?” But another part is excited about such a comprehensive reference framework to nail down the moves that cyber attackers make—and to map responsive counteractions in defense. With funding from the NSA, MITRE D3FEND was released this summer to fill in…
Read More