Healthcare Security Fireside Chat: NIST, Identity, and Ransomware

Healthcare Security Fireside Chat: NIST, Identity, and Ransomware

  • Nov 25, 2020

No one can ignore the sharp uptick of hospitals victimized by ransomware. And in healthcare, the stakes are higher. Just last month, a 78-year-old patient at University Hospital Düsseldorf died after a ransomware attack crippled the hospital's IT systems and forced doctors to attempt to transfer her to another facility.…

A Cyber-First Approach to Disaster Recovery

A Cyber-First Approach to Disaster Recovery

  • Nov 25, 2020

In this era of digital transformation, cyber weaponization is commonplace, and the "extinction event" is a genuine threat, especially for organizations with uptime and availability requirements. As we've seen in the headlines, cyber disasters cripple business operations and impact shareholder value. For instance, Equifax just became the first company to…

Seizing the Castle: A Medieval Battle Technique Workshop

Seizing the Castle: A Medieval Battle Technique Workshop

  • Sep 16, 2020

The cybersecurity industry is not at a loss when it comes to cheesy castle analogies or quoting Sun Tzu whenever it gets the chance (keys to the kingdom, crown jewels, the art of war), you name it we’ve butchered it. But what if we took some time to look at the whole medieval…

The Dos and Don’ts of Recovering Active Directory from a Scorched Earth Disaster

The Dos and Don’ts of Recovering Active Directory from a Scorched Earth Disaster

  • May 27, 2020

In the age of cloud, dependency on Active Directory (AD) is rapidly growing — and so is the attack surface. The threat to AD from ransomware and wiper attacks is generally understood, but the complexity of forest recovery is not. In “the good old days,” AD recovery meant recovering AD…

Attacking & Defending Active Directory Workshop

Attacking & Defending Active Directory Workshop

  • Apr 02, 2020

How do you defend Active Directory, aka the “keys to the kingdom,” if you don’t know where the attacks are coming from? Hackers constantly find new ways to break into AD. And once inside, they’re increasingly adept at covering their tracks to silently create backdoors and establish persistent privileged access.…