top of page
Search

Zero trust network access (ZTNA) versus remote access VPN
Remote access VPN has long served us well, but the recent increase in remote working has cast a spotlight on the limitations of this...
May 22, 20225 min read
18 views
0 comments

Attackers linger on government agency computers before deploying Lockbit ransomware
Threat actors spent more than five months remotely googling for tools from the target's machines Written by Andrew Brandt, Angela...
Apr 14, 20228 min read
19 views
0 comments

Experts offer advice on cyber insurance trends, qualifying for coverage
Marsh McLennan Agency, Mosaic Insurance headline cyber insurance event Written by Stephen Lawton Qualifying for a cyber insurance...
Mar 31, 20228 min read
10 views
0 comments

Xstream SD-WAN in SFOS v19
Written by Chris McCormack March 17, 2022 Sophos Firewall OS v19 includes several new innovations. In this blog series leading up to...
Mar 24, 20223 min read
7 views
0 comments

Countermeasures and observability key to defending against attackers trying to buy security products
The leak of Conti ransomware's internal chat logs revealed the attackers tried to buy security software so they could figure out how to ...
Mar 6, 20223 min read
7 views
0 comments

Conti and Karma actors attack healthcare provider at same time through ProxyShell exploits
An unpatched Microsoft Exchange Server let both ransomware actors in; Karma just stole data, while Conti encrypted. Written by Sean...
Mar 1, 20221 min read
39 views
0 comments
bottom of page