Just before the Fourth of July weekend, we saw an advisory from Kaseya Corp., the Miami-based maker of remote access software, that its Virtual System/Server Administrator (VSA) software had been compromised.
Contain Your Enthusiasm! How Abacode Can Continuously Monitor Your Docker and Kubernetes Environments.
The modern method for delivering software applications to users is containers.
The increasing complexity of application deployments is what gave rise to containers a few years back.
Here are some thoughts on the landmark June 3 Supreme Court ruling which found, in a 6-3 vote, that the Computer Fraud and Abuse Act of 1986 (CFAA) does not cover situations in which people who are authorized to access a computer system do so for improper reasons.
The recent Colonial Pipeline ransomware attack appears to have been fairly run-of-the-mill and not much different from other attacks we’ve seen – other than the fact that it shut down critical infrastructure, spiked gas prices, and created FUD in the United States populace.
I have been working in cybersecurity for 25+ years and for the past five years in multifamily IT environments. I have learned about the typical scenarios in multifamily property management:
(1) numerous remote users (even before COVID!),
(2) heavy reliance on cloud and Software-as-a-Service (SaaS) – from providers such as Yardi, RealPage, Entrata, and ResMan, and
(3) often a sense that those SaaS providers are “taking care of security for me.”
A Wakeup Call It’s not often that we get missives about specific cyber-threats from the FBI Special Agent coordinating our local InfraGard chapter. But earlier this month, we...
Cybersecurity experts have long warned of attacks on small municipal systems. Until hackers accessed the water treatment plant of a small Florida city this year, those warnings were “out of sight, out of mind.” Now, both local and national authorities’ perspectives on the dangers of cybersecurity attacks are changing.
We’ve all heard the warnings, “it’s not a matter of IF you’ll suffer a cyberattack, it’s WHEN.” Yet according to one study, more than 77% of organizations have no incident response plan. Hard to believe when you consider that attacks can cost businesses millions of dollars. What’s worse, 60% of those attacked go out of business within six months of being victimized.
The hard truth is, whether your industry demands it or not, you’re going to be compliant with something. If you’re not applying cybersecurity best practices, then you’re compliant with ZERO.
Let’s take a look at the FireEye breach, and I do so not in a critical manner at all, for I know that we are constantly targeted as well.