top of page
Search
May 22, 20225 min read
Zero trust network access (ZTNA) versus remote access VPN
Remote access VPN has long served us well, but the recent increase in remote working has cast a spotlight on the limitations of this...
18 views0 comments
Apr 14, 20228 min read
Attackers linger on government agency computers before deploying Lockbit ransomware
Threat actors spent more than five months remotely googling for tools from the target's machines Written by Andrew Brandt, Angela...
19 views0 comments
Mar 31, 20228 min read
Experts offer advice on cyber insurance trends, qualifying for coverage
Marsh McLennan Agency, Mosaic Insurance headline cyber insurance event Written by Stephen Lawton Qualifying for a cyber insurance...
9 views0 comments
Mar 24, 20223 min read
Xstream SD-WAN in SFOS v19
Written by Chris McCormack March 17, 2022 Sophos Firewall OS v19 includes several new innovations. In this blog series leading up to...
7 views0 comments
Mar 6, 20223 min read
Countermeasures and observability key to defending against attackers trying to buy security products
The leak of Conti ransomware's internal chat logs revealed the attackers tried to buy security software so they could figure out how to ...
7 views0 comments
Mar 1, 20221 min read
Conti and Karma actors attack healthcare provider at same time through ProxyShell exploits
An unpatched Microsoft Exchange Server let both ransomware actors in; Karma just stole data, while Conti encrypted. Written by Sean...
37 views0 comments
bottom of page