Blockchain is essentially about creating trust in an untrusting environment, which makes it the perfect candidate for cybersecurity innovation. Going back to it’s key properties we can start to see why blockchain can be useful for security. Because the blockchain is distributed it provides no hackable entrance or point of failure that detrimentally exposes entire datasets. The decentralized storage of information ensures that…
Kaseya Ransomware Attack: Hackers Demand $70 Million for Joint Ransom
Ransomware Attacks are Coming Soon to a Business Near You!
This is hardly the type of advertising you’d expect to see around businesses in your community as summer heats up and Americans begin the slow process of venturing out into a post-COVID consumer environment. Although the highly publicized ransomware cyber attack against Colonial Pipeline in May 2021 hit most of our feeds, including mine, I still did not feel like this type of cyber attack would affect the types of smaller scale consumer activities that I depend on.
Cloud Infrastructure Entitlements Management (CIEM) - Why Identity Management in the Cloud is Difficult
In the cloud, physical borders have disappeared and identity has become the new perimeter defense. Conventional IAM solutions were designed to control human access to a limited set of systems and applications deployed in a corporate data center. With cloud infrastructure, IAMs must control and track access privileges for human and service identities across an ever-changing variety of cloud services.