Blog
Multifactor Authentication: What is it? How to use it?
Ensuring seccuring access to accounts, networks and devices has never been more critical. Threat actors are increasingly innovative and sophisticated, getting into places they don’t belong. Cybersecurity professionals and leaders have long
Best Practices for a Secure Password
Understanding and implementing best practices for password security is essential. Safeguarding sensitive information demands a keen understanding of the vulnerabilities associated with passwords. Strong passwords serve as the first line of defense
Tackling the Business Risks of AI
Are we unknowingly opening Pandora’s box with AI (Artificial Intelligence) in our businesses? Recently, Atlantic Data Security teamed up with Fortra for an insightful webinar exploring this very question. What are the immediate
Over 178,000 SonicWall Firewalls are publicly exploitable to years old bug
Yesterday, Bishop Fox released research where they found that at least 178,000 SonicWall firewalls devices were vulnerable to at least one of two critical exploits that had been discovered over a year ago.
Content Zero Trust
As malware becomes increasingly sophisticated and harder to detect, the need for robust cybersecurity has never been more critical. Zero Trust has emerged as a powerful model in this landscape, primarily focusing
How Ethical Hackers Make Us All Safer
The term “hacker” is often a pejorative. It conjures up images of shadowy figures in basements, relentlessly breaching systems for nefarious reasons. “Hacking” has been predominantly associated with illegal activities and unauthorized
6 Critical Challenges to Cloud Security
Cloud environments constantly change with new threats and higher stakes, from data breaches to compliance demands.
Explore six common challenges of cloud security and how they impact risk.
5 Ways to Prepare for a Cyber Attack
It is no longer a question of if your organization will be hacked but a question of when. Security teams must be prepared to deal with breaches and cybersecurity attacks, or they
Supply Chain Cybersecurity
The Critical Intersection of Supply Chains and Security Digital transformation is reshaping business, and the role of technology supply chains has become more pivotal than ever. These software supply chains are
Pennsylvania Water Utility Cyberattack
Pennsylvania Water Utility Cyberattack: What We Can Learn A recent cyberattack on Pennsylvania’s Municipal Water Authority of Aliquippa has sent ripples through the cybersecurity world. Perpetrated by the Iranian-affiliated group Cyber Av3ngers,
NIST Cybersecurity Framework 2.0 – What’s New?
In the rapidly evolving world of cybersecurity, staying ahead of emerging threats requires vigilance and a framework that evolves with the times. The recent unveiling of the NIST Cybersecurity Framework 2.0 is
What is Data Classification?
In today’s data-driven world, managing and protecting information has become a critical challenge for modern organizations. The explosion of data, much of it unstructured and sprawling across diverse digital landscapes, has made
How to Reduce Alert Fatigue
What if your security tools are the biggest threat to your security posture? As ironic as that would be, that’s closer to the truth for many security teams than they would like
Four Most Common Cyberattacks
The threat landscape is evolving rapidly, presenting new challenges that demand constant vigilance. Cyberattacks and threats are ubiquitous in our online existence. Adversaries employ increasingly sophisticated methods to exploit vulnerabilities. From the
What is the MITRE ATT&CK Framework?
You can’t spend too long working in cybersecurity without hearing about the MITRE ATT&CK framework. First released in 2013, made freely available to the public in 2015, and biannually updated since then,