Blog
Stay informed about the latest ransomware threats, security best practices, and product updates.
Defender Spotlight Tyler Hudak
In this series, we highlight security professionals and their work behind the scenes. Questions are based on their experiences over their careers, not necessarily reflective of their current employer.
Defender Spotlight Andy Jackman
In this series, we highlight security professionals and their work behind the scenes. Responses and opinions are based on their experiences over their careers, not necessarily reflective of their curr...
Defender Spotlight Aaron Shelmire
* Aaron * : There’s a few!
Defending Against Ransomware and Wipers with the Purdue Model for OT Networks
In recent years, the proliferation of ransomware and wipers has posed significant threats to operational technology (OT) networks across various industries. These malicious attacks can disrupt critica...
Understanding Akira: A Persistent Ransomware Threat
In the ever-evolving landscape of cybersecurity, staying informed about emerging threats is crucial for organizations to protect their digital assets. One such threat that has garnered attention is th...
Volt Typhoon A multi year Chinese Cyber Assault on Critical Infrastructure
In a very public fashion, FBI Director Christopher Wray recently discussed the extent of China’s ongoing hacking campaign, known as Volt Typhoon. The campaign, as reported by Reuters on April 18th, 20...