A majority of ransomware activity resulted from three leading groups. Beazley Security Labs also identified interesting trends with infostealers, including sophisticated techniques to deliver and obfuscate the malware, along with new entrants rising to fill demand.
Protecting against a ransomware attack requires the right approach to IT security and risk management, including a defence in depth approach to securing your environment.
Listen to our panel of experts as they delve into the complex world of artificial intelligence in business.
Behavior-based detection is the modern standard for security as traditional AV became obsolete.
Distributed denial-of-service (DDos) attacks are on the rise again, with cheap tools available to launch them and cybercrminals using DDoS as part of broader attacks.
Email Spoofing is a technique involving sending emails with a fake sender address, stealing the identity of a real user that is typically trusted in the eyes of the victim.
The success or failure of an attack hinges on the intersection of the information attackers have gleaned about a potential target, and their ability to translate that into a weapon to use against them.
Beazley Security is aware of reports concerning crashes on Windows hosts related to the Falcon Sensor. Beazley Security has written recovery guidance for organizations who are impacted by this issue.
The VERACIS platform was built to serve as a centralized source for all Beazley Security services, starting with our new Managed eXtended Detection and Response (MXDR) offering.
Is your organization getting the most out of its cyber security investment? Many people don’t realize that it is possible to improve your organization’s controls simply by finetuning the ways that you use the resources you already have.
Small and medium-sized businesses have a unique challenge when it comes to cyber security. Unlike large corporations and government agencies that typically have formal information security teams working full time to prevent and manage cyber threats, these smaller companies rarely have the resources to systematically address their ongoing security needs.
Our expert panelists discuss evolving regulatory requirements, best practices, and practical challenges healthcare organizations face during cyberattacks.
Let’s get the acronym out of the way so we are all on the same page – Multi-Factor Authentication (MFA). As a part of an overall Identity and Access Management (IAM) program, MFA can play an important role in managing access and protecting key assets.