Blog October 31, 2019
Ransomware isn’t going anywhere anytime soon. In fact, it will only continue to increase in frequency and sophistication. The best you can do for your business is to maintain a strong position of defense and know what to do in the event of an attack.
Security August 22, 2019
The recent Facebook & AWS breach originating from two third-party companies can teach us an infosec lesson: customers are responsible for their data in the cloud.
Security June 25, 2019
In June, Adobe released patches for ColdFusion 11, ColdFusion 2016, and ColdFusion 2018 that address a critical vulnerability allowing arbitrary code execution. Here’s what you need to know.
Compliance June 14, 2019
It’s been one year since GDPR went into effect. How has it impacted privacy laws in the U.S., and what are businesses doing differently as a result?
Security May 16, 2019
Microsoft patches Windows 2003, 2008, and 2008 R2 servers. The patch mitigates the possibility that an attack could happen via Remote Desktop Protocol.
Security March 22, 2019
The only way to be prepared for cyberattacks is with a fully integrated incident response plan. Learn why IR is critical to security preparedness.
Cloud March 13, 2019
In today’s hybrid multi-cloud environments, visibility and proactivity are the keys to availability. It’s no longer sufficient for IT teams to simply react to issues.
Security March 11, 2019
On March 1, 2019, Adobe released patch advisory APSB19-14 for all currently maintained and supported versions of ColdFusion. Here’s what you need to know.
Compliance October 30, 2018
Mark joins I Love Data Centers podcast to discuss all things data security and explain the roles of data center providers and clients in data protection.
Security October 17, 2018
On September 11, 2018, Adobe released security updates to ColdFusion 2018, 2016, and 11. The purpose of these security updates is to patch a vulnerability that could lead to arbitrary code execution. On September 28, 2018, Adobe has determined that CVE-2018-15961 is being actively exploited in the wild which specifically allows for unrestricted file uploads. […]