Dozens of hospitals have been admonished to immediately patch weaknesses in their VPN infrastructure after finding evidence a ransomware crew was probing for weaknesses to exploit.
With the release of the Cybersecurity Maturity Model Certification, the time for systems integrators and other contractors to evade compliance with cybersecurity mandates has finally run out.
Defendify Co-Founder Rob Simopoulos discusses the cyber landscape and informs integrators about opportunities in this burgeoning field.
According to Beazley, the two most common forms of attack to deploy ransomware are phishing emails and breaching poorly secured remote desktop protocol (RDP).
Answer these important questions when evaluating your portfolio and growth plans for the future of your business to ensure long-term success.
Digital transformation is about business model change, not product evolution cycles. Here’s why you should adopt a managed security service provider program.
The report also found that a vast majority of IoT devices are unencrypted, potentially exposing personal and confidential data.
PSA’s MSSP program helps integrators diversify their service offerings and realize the full potential and benefits of a managed services business model.
Malicious cyber actors could take advantage of public concern surrounding COVID-19 by conducting phishing attacks and disinformation campaigns.
Clearview AI scrapes billions of images from social media and the Internet, which are then used to match unknown faces for law enforcement agencies.