Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 2023

Building Cyber Resilience Amid Azure Migration

With ransomware increasing and a complex, business-critical cloud migration on the horizon, BSM, one of the world’s largest shipping companies, was seeking a solution to monitor its environment for potential threats, both now and in the future. Working with Kroll gives the company greater visibility across its global network of offices and ships to better detect and respond to threats.

Effective AWS Incident Response: Examples and Recommendations

The use of Amazon Web Services (AWS) in organizations around the world is prolific. The platform accounted for 31% of total cloud infrastructure services spend in Q2 2022, growing by 33% annually. Despite its widespread use, many organizations still fail to consider the nuances of incident response in AWS.

Webinar Replay: Active Assailant Preparedness Webcast with Security and Risk Management Experts

In this webcast, Kroll Managing Directors Matthew Dumpert, Daniel Linskey and Sherine Ebadi and Crisp Vice President Jon Best shared their unique perspectives on active assailant incidents as former law enforcement and government leaders and discuss how organizations can prioritize workplace safety by focusing on, detecting and mitigating potential threats before they manifest in tragic violence.

What Is a DMA Attack? Understanding and Mitigating the Threat

You have probably wondered what would happen if your company laptop got lost or stolen. Would someone be able to extract sensitive data from your laptop even if the device is encrypted or locked? There are several ways to compromise a laptop with physical access, and one of them is through a direct memory access (DMA) attack.