Blog

Maersk Attack Illustrates the Enormous Cost of Downtime

In a previous post, I discussed the dangers of “aftershock” attacks as organizations continue to feel the impact of the WannaCry ransomware attack. Microsoft issued an emergency patch for the exploit behind WannaCry, but the malware continues to impact PCs and servers running...

Why ‘Aftershock’ Attacks May Bring More Tears than WannaCry

LG recently confirmed that some of its self-service kiosks in South Korea were infected with WannaCry, forcing the consumer electronics manufacturer to shut down some of its systems to prevent further spread of the malware. It’s the latest outbreak of the worst ransomware attack...

Why Security Is Critical to the Success of the Internet of Things

In my last post, I discussed the shared responsibility model of cloud computing, and why organizations must take steps to protect the applications and data that they move to public cloud platforms. Cloud providers are only responsible for securing their infrastructure — not...

Who’s Responsible for the Security of Data in the Cloud?

On June 8, 2017, security researchers discovered a data repository on the Amazon Simple Storage Service (S3) that could be accessed by anyone on the Internet.

The repository contained the names, addresses, account details and personal identification numbers (PINs) of up to 14...

Consolidated Billing Helps Optimize the Cloud Spend

Back in 2009, the National Institute of Standards and Technology (NIST) drafted a formal definition of cloud computing. The definition states that the cloud has certain essential characteristics, including on-demand self-service, broad access, resource pooling and rapid...

The Growing Cybersecurity Threat to Medical Devices

It’s chilling to think that a heart monitor, blood gas analyzer or MRI scanner could be infected with malware, but the threat is very real. Malware called MEDJACK (short for “medical device hijack”) was recently found on equipment at 10 U.K. hospitals.

First discovered in...

Cybersecurity Must Be a High Priority for K-12 Schools

Like businesses large and small, K-12 schools are relying heavily upon technology for their day-to-day operations. In the classroom, teachers are using a wide range of rich media curricula, and printed textbooks are being replaced by electronic versions. Tests are increasingly...

How Much More Data Can Your Healthcare Infrastructure Handle?

Thanks in large part to the shift to electronic health records and more widespread adoption of connected devices and equipment, healthcare organizations are generating a ton of data. To enhance care and improve outcomes, this data must be easily accessible to doctors and other...

Why Hospitals Are Seeing an Onslaught of Ransomware Attacks

High-profile ransomware attacks have plagued hospitals during the first half of 2016, forcing operators into damage control mode as IT teams scramble to beef up their security strategies. According to the FBI’s Internet Crime Complaint Center (IC3), the number of ransomware...