Ransomware is getting worse, but Daniel Spicer, chief security officer at Ivanti, offers a checklist for choosing defense solutions to meet the challenge.
Threatpost
Posts tagged "Steps"
AT&T Takes Steps to Mitigate Botnet Found Inside Its Network
AT&T is battling a modular malware called EwDoor on 5,700 VoIP servers, but it could have a larger wildcard certificate problem.
Threatpost
5 Steps to Securing Your Network Perimeter
Ekaterina Kilyusheva, head of the Information Security Analytics Research Group at Positive Technologies, offers a blueprint for locking up the fortress.
Threatpost
5 Steps For Securing Your Remote Work Space
With so many people still working from home, cybercriminals are trying to cash in. Cyberattacks have increased 300% and the risk of losing important data or being compromised is much greater at home.
Here are five recommendations for securing your home office.
Threatpost
Top Steps for Ransomware Recovery and Preparation
Alex Restrepo, Virtual Data Center Solutions at Veritas Technologies, discusses post-attack restoration options, and how to prepare for another one in the future.
Threatpost
5 Steps to Improving Ransomware Resiliency
Alex Restrepo, cybersecurity researcher at Veritas, lays out the key concepts that organizations should be paying attention to now and implementing today.
Threatpost
The New CISO Journey Includes Tried & True Old Steps
The new CISO journey might be different with new starting points and new stops along the way. But without technical and technological know-how that journey can end in disaster. The new CISO journey mu…