Member Spotlight: Jason Reaves

Today’s member spotlight is Jason Reaves, senior-level individual contributor for Walmart Global Tech. We asked him to share with us his journey in cybersecurity and how he is utilizing his RH-ISAC membership. RH-ISAC: What is your background in cybersecurity? Where did you get your training and education? Jason: I moved from a development and military…

Read More

Preventing Ransomware Attacks in a Hybrid Cloud Environment

Businesses interested in scaling up operations are turning to hybrid cloud environments as a cost-effective solution. Hybrid clouds provide the best of both worlds, allowing companies to expand their network without investing in additional, costly on-premises servers that must be maintained. While there are a number of benefits to a hybrid cloud environment, it is,…

Read More

Newly Discovered Chinese APT Operating Cyberespionage Campaign Against APAC Organizations Since 2013

Context On June 9, 2022, SentinelLabs disclosed technical details of a new Chinese-speaking cyberespionage group designated Aoqin Dragon. According to researchers at SentinelLabs, the group has been operating a cyberespionage campaign against government, education, and telecommunication organizations in Southeast Asia and Australia from at least 2013 to the present. SentinelLabs researchers also assessed with moderate…

Read More

Mitigate Compliance Risks with Cloud Security Posture Management (CSPM)

In a recent report, Gartner states that “through 2022, at least 95 percent of cloud security failures will be the customer’s fault.” So much for shared responsibility! The reality is that the public cloud providers are only responsible for the infrastructure required to host the cloud, while the consumer remains responsible for the data, applications,…

Read More

Federal Joint Advisory Warns of Chinese Threat Actors Targeting Telecommunications and Network Service Providers

Context On the evening of June 7, 2022, the United States National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI) released a joint advisory detailing the tactics, techniques, and procedures (TTPs) used by unspecified Chinese state-backed threat actors to target unspecified telecommunication and network service organizations…

Read More