One look at all the ransomware attacks from the past few years, and it’s clear that crypto-malware actors are attempting to maximize their financial gain. activereach is an authorised partner of Cybereason who have observed these threat groups using multiple techniques to profit even more off their victims than in years past.more →
New BlueField DPU lineup and DOCA SDK push the boundaries of zero-trust protection; Check Point Software partnership to take on IoT security.
Cloud-minded enterprises face a number of challenges: From hybrid cloud architectures and infrastructure virtualization to multiple levels of attacks and a lack of visibility. Complex issues like these limit an enterprise’s ability to implement effective security strategies.more →
A DDoS (Distributed Denial of Service) attack seeks to exhaust resources in a given infrastructure (nowadays, mostly cloud-based systems), to hinder the operation of its services and applications.
There are different types of DDoS attacks. In volumetric assaults, the target becomes overloaded due to the sudden increase in traffic volume, disrupting it and preventing legitimate users from accessing the service.more →
Thanks to the growing availability of vaccines and immunization campaigns in multiple countries, the world is starting to see a light at the end of the COVID-19 tunnel. We are eager to return to a new normal, being aware that some changes will be permanent, or if not permanent will strongly characterize the next years.more →
Adding Profound Value to Security and Risk Functions
Defending your organization’s attack surface in today’s threat landscape is a global-scale challenge full of continuously changing elements.
Attacker tools have flooded the web, and advanced adversaries target massive vulnerabilities in ubiquitous systems used across the world.more →
The popularity and usage of Microsoft 365 had gradually grown over the last few years, but recently this has increased significantly with the explosion in home working as a result of the pandemic. This has led many organizations to now consider MS 365 a business-critical application. As happens to many applications, a rise in usage leads to an increase in interest from threat actors, looking to benefit from any vulnerabilities.more →
Data privacy in cyber-security is a hugely regulated sector. New regulations such as the California Consumer Privacy Act (CCPA) and the EU’s General Data Protection Regulation (GDPR) have added to the list of compliance mandates that already included PCI-DSS for financial data and HIPAA for patient information.more →
SolarWinds: Illuminating the Hidden Patterns That Advance the Story
Below we share an article by Team Atlas updating us on the SolarWinds story and the vital role of RiskIQ.
Though the Russian espionage campaign that compromised the SolarWinds supply chain is progressing, public-facing research into the campaign seems to have stopped.more →