Blog
Defender Spotlight Tyler Hudak
In this series, we highlight security professionals and their work behind the scenes. Questions are based on their experiences over their careers,...
Defender Spotlight Andy Jackman
In this series, we highlight security professionals and their work behind the scenes. Responses and opinions are based on their experiences over...
Defender Spotlight Aaron Shelmire
Interview with Aaron Shelmire, Chief Threat Research Officer & Co-FounderInterviewer: Can you tell us about a favorite incident that you...
Understanding Akira: A Persistent Ransomware Threat
In the ever-evolving landscape of cybersecurity, staying informed about emerging threats is crucial for organizations to protect their digital...
Volt Typhoon A multi year Chinese Cyber Assault on Critical Infrastructure
In a very public fashion, FBI Director Christopher Wray recently discussed the extent of China's ongoing hacking campaign, known as Volt Typhoon....
Defending Against Ransomware and Wipers with the Purdue Model for OT Networks
In recent years, the proliferation of ransomware and wipers has posed significant threats to operational technology (OT) networks across various...