cybersecurity-news

Ransomware Techniques in 2022: How to Detect Malicious Activity

Ransomware actors are always evolving their techniques. This is especially true now, considering the increased use of legitimate applications and LOLB...

Supply Chain Security Snags: How to Solve Your Sourcing, SBOM & Scope Struggles

The executive order issued by the White House last year calls for more robust software supply chain protections for federal agencies. Meanwhile, compa...

Part 1: The Telltale Signs of a Network Compromise: A Stage-by-Stage Attack Chronology

The average dwell time of a network intrusion lasts an average of 197 days before discovery, according to a Ponemon Institute study. During that windo...

Kicking Cyber Hygiene Into High Gear: 5 Must-Know Tips for Consistent Execution

When it comes to developing strong security hygiene habits, it’s easy to talk a big game. But consistently executing on these practices is another b...

Part 2: Detection & Response Demo: Patrolling Every Packet & Process for Signs of Compromise

Ant Ducker, Lead Cyber Security Solution Engineer at VMware, has twenty+ years’ experience in engineering, deployment, operation and maintenance of ...

Ransomware & Zero Days: A 5-Step Action Plan to Avoid Becoming the Next Big Headline

Melissa Bischoping is a passionate security evangelist whose academic & professional background in human psychology and technology align to educate, a...

AccessQuint Access360