Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automating Azure Files Restore in Azure Kubernetes Service

If you are considering Azure Files as the persistent storage for your Azure Kubernetes Service (AKS) applications, there are important considerations around AKS backup and recovery with implications on how you can perform Dev, Test, and Staging. This article outlines these data management considerations in detail and how to work around Azure Files limitation to achieve feature parity with using Azure Managed Disks.

Windows SAM & AD SAM Security - Essential Guide 2023

The Security Accounts Manager (SAM) is a database file in Windows operating system that comprises of usernames and passwords. The main aim behind SAM is to make our system more secure and reliable by protecting credentials in case of a data breach. Configuring SAM gives users the ability to authenticate themselves to the local machine if an account has been created for them in security accounts manager.

3 Critical Elements of Effective Insider Risk Management

Whether businesses are grappling with rapidly changing market conditions, continued pandemic disruptions, geopolitical conflicts, or shifting workplace arrangements, threat actors are looking to take advantage of the moment to undermine network integrity or compromise data privacy. In many ways, their efforts are bearing fruit. According to a recent industry survey, 66 percent of respondents indicated they experienced a ransomware attack in 2021, a 29 percent year-over-year increase.

How to defend against third party cyber-attacks

In this blog post, we discuss the different types of challenges that third party relationships present and outline specific ways to defend against them. Third party risk is created when companies in an organisation’s supply chain have access to its data, systems or privileged information. This can lead to issues such as data breaches, IP theft or other security incidents. Organisations can be held accountable for security breaches even if they originate from a third party.

Q2 2022 Threat Landscape Briefing: Ransomware Returns, Healthcare Hit

In Q2 2022, Kroll observed a 90% increase in attacks against the health care sector in comparison with Q1 2022, making it the most affected sector during this period. While this may signal the official end of the pandemic-era “truce” that many cybercriminals promised at the onset of COVID-19, threat actors are continuing to leverage other hallmarks of the pandemic, such as remote work access, to gain a foothold into victim networks.