Understanding Client-Side Risk on your eCommerce Website: What’s Happening on the Payment Page?

Security spend for eCommerce companies grows year on year, and according to data researched by BigCommerce, 77% of businesses bought new security tools in the last year, and 69% have added security headcount to their teams. However, is this security being targeted in the right direction? In particular – how much attention do you put…

Read More

Ransomware Recovery: How to Restore Your Data from Backup

According to Fortinet’s 2021 Global Threat Landscape Report, 94% of organizations say they are concerned about a ransomware attack. The thing they’re most concerned about? 62% said the risk of losing data. Attackers know this; that’s why ransomware attacks are even attempted in the first place. Threat actors understand that data is valuable, and companies…

Read More

Preventing Ransomware Attacks with Threat Intelligence Sharing

https://youtu.be/bgAbz3PQBAs In the last few years, ransomware planning has become a priority for cyber teams, with 85% of organizations in Fortinet’s 2021 Global Threat Landscape Report reporting ransomware as their biggest security concern. Similarly, ransomware resilience planning topped the list of CISO initiatives for 2022 in RH-ISAC’s recent Benchmark Report. Ransomware resilience planning tends to…

Read More

Remove the Adversary Advantage with Zero Trust

For many enterprises, zero trust has emerged as the North Star of modern cybersecurity frameworks, designed to help organizations reduce their attack surface and risk by applying principles of least privilege or a “never trust, always verify” approach. Some zero trust-based security controls, like multi-factor authentication (MFA), are designed to add layers of login defense…

Read More

How Botnets are Used in Ransomware Attacks

A botnet is a network of devices that have been infected with malware, allowing a threat actor to control them. However, instead of completely taking over the devices, the individual orchestrating the attack, known as the bot herder, will use a portion of the computer’s bandwidth to run an activity in the background without the…

Read More