Articles by tag: cyberattack
Latest
Identifying Lightning Damage on Pecan Trees: Tips from TreeNewal
Join ISA Certified Arborist Wes Rivers from TreeNewal as he examines the aftermath of lightning damage on a pecan tree. In this insightful video, Wes highlights the path taken by the lightning bolt through the tree, causing superheating of the water inside. The resulting vapor expansion creates visible damage to the tree. The tree’s survival […]
Transforming Coverage to Meet Healthcare Needs with SCAN Health Plan
John Petito, SVP of Transformation at SCAN Health Plan joins the podcast to share his story and how his work is helping enable new types of healthcare coverage for diverse populations. Join us to hear how Health Plans are beginning to evolve their approach to addressing the needs of older adults and the LGBTQ+ community […]
Finding Your Identity with Dustin Odham
In an era where screens dominate our time, finding your personal identity becomes a challenge. Our generation is shaping itself based on an increasingly virtual world, often losing touch with the inner self. In fact, a recent study suggests that we could end up spending at least ten years of our life in front of […]
Ransomware…What in the World Is Going On?
In a landscape that’s seen an uptick in cybersecurity concerns thanks to a boost in remote work, hurried adoption of technology solutions and more, there’s one cyberattack du jour – ransomware. To explore this specific kind of threat and its impact on government Weaver: Beyond the Numbers, The Business of Government host Adam Jones was […]
The Playbook for Tackling Enterprise Cloud Security
On this episode of Fiberside Chat, a 3-GIS podcast, host Daniel Litwin and guests Damion Harrylal, 3-GIS Solutions Engineer, and Keith Mokris, Director of Product Marketing for Prisma Cloud at Palo Alto Networks, got right to the point. In the post-pandemic era, companies are operating in a landscape featuring more cybersecurity risk than ever […]
What’s Driving Recent Massive Cyberattacks on Enterprise Companies?
Lately, it seems there’s been an uptick not only in cyberattacks and other network infrastructure breaches, such as the use of ransomware – these attacks also seem to be (successfully) targeting companies of greater and greater stature. In fact, a long line of juggernauts, from McDonald’s to Volkswagen and the Colonial Pipeline, have fallen victim […]
The Colonial Pipeline Cyberattack is a Study on Material Price Fluctuation
The recent successful cyberattack on the Colonial Pipeline sent a shockwave throughout the oil and gas industry beyond in the United States, and it’s not serving as a unique case study in how the sector impacts the entirety of the supply chain and many corners of society. To diagnose the attack’s impact and help break […]
How Companies Can Defend Against Cyberattacks
The way we communicate, share data and use technology to act on those insights is changing – and it’s all leading to the cloud. On In the Cloud, every week new experts will engage in a fire side chat and will bring their extensive experience in software, IT and mobile solutions straight to you, offering a […]
Why Higher Ed Needs Better Protection from Modern Ransomware Attacks
Higher education institutions suffering from ransomware attacks is nothing new. However, as institutions shift to distance learning, the attack surface is much greater, giving malicious actors greater opportunity. Institutions have a plethora of data – student assignments, academic research, administration and admission files, and alumni relations materials. The amount of data institutions have is incredible […]
Developing a Successful Security Strategy
On this episode of the MarketScale ProAV podcast, host Tyler Kern was joined by Diversified Director of Electronic Security Solutions Bill Aheimer. In the wake of the COVID-19 pandemic, many things across the globe’s industries and organizations have been thrust into uncertainty. However, there’s one thing businesses can always control – security. There are […]
Parabellum: Attack on US Critical Infrastructure and the Post Mortem of an IT/OT Attack
Tony Rowan, Cyberbit Cybersecurity Architect, provided a deep-dive into the Grizzly Steppe campaign which targeted critical infrastructure networks in North America. Rowan introduced the discussion with an overview of Cyberbit, before he launched into some examples of several attacks on OT (Operational Technology) networks over the last few years. Rowan provided a kill chain […]