Blogs by Topic
How can you leverage your SIEM as part of your Zero Trust strategy?
Continuous monitoring is one of the most important facets of any Zero Trust Architecture. The level of trust a system has in any user, application or data flow may change from one minute to...
Read MoreRecent Additions to TeamTNT Malware Campaign on Cloud Environments (TIR-20210124)
This report is about the recent additions to the TeamTNT malware campaign to infect and spread through cloud environments. The malware has been updated to capture AWS IAM user details...
Read MoreSunBurst Backdoor and Malware Campaign
SunBurst Backdoor Overview This report is about the recently disclosed SunBurst backdoor and the related malware campaign. The malware campaign has been attributed to APT29, a GRU (Main Intelligence Directorate)...
Read MoreSolarWinds Orion Compromise Guidance
SolarWinds Orion Compromise This threat report is about the SolarWinds Orion platform compromise and contains information pertinent to security operations teams that have the specific version of SolarWinds Orion deployed...
Read MoreWhat You Need to Know about Telemedicine, HIPAA Compliance and the Pandemic
The COVID-19 pandemic has spawned many new business realities including the mainstreaming of telemedicine and with it, the state of HIPAA compliance. The American Medical Association estimates that $250 billion...
Read More3 Scary Stories of Data Breach Disasters
Tales of Frightful Security Breaches Gather around the campfire, everyone! Just in time for Halloween, we’re going to tell scary stories for data breaches. Beware! These three cautionary tales about...
Read More