Who’s to Blame for Ransomware Attacks?

Originally published on TechTarget. Alvaka’s COO and CISO—Kevin McDonald—discusses that, although cyber attackers are the main culprits for ransomware attacks, the companies that release flawed software or those who don’t install patches are not off the hook. In early May, [...]

Who’s to Blame for Ransomware Attacks?2019-07-18T15:14:52-07:00

How Intelligence Data Leaks Has Damaged Infosec

Originally published on June 19, 2017 on TechTarget. Alvaka’s COO and CISO, Kevin McDonald, examines the real-world damage caused by CIA and NSA data leaks, putting dangerous government cyberweapons in the hands of hackers. WikiLeaks' CIA data dump shook a [...]

How Intelligence Data Leaks Has Damaged Infosec2019-07-17T15:50:44-07:00

The Importance of Third-Party Software Patching

And Why Executives Should Care... Threats to network security seem to get announced weekly. Global ransomware attacks like WannaCry cause havoc around the world and billions of dollars in losses. Businesses are actually shuttering due to network attacks that disable, [...]

The Importance of Third-Party Software Patching2019-06-27T15:45:00-07:00

DFARS 252.204-7012: Aerojet Rockets to a Courtroom Sting

I was stunned to learn that Aerojet, a division of Rocketdyne, set legal precedent three weeks ago in the Federal District Court for the Eastern District of California. The heart of the matter is an allegation that Aerojet made false [...]

DFARS 252.204-7012: Aerojet Rockets to a Courtroom Sting2019-06-24T10:32:35-07:00

Finding an MSP to Protect Yourself from Outsourcing IT Risks

Article originally posted on TechTarget. Alvaka's COO and CISO, Kevin McDonald, discusses the type of questions you should ask MSPs to ensure they have the correct security systems in place in order to protect your organization against outsourcing IT risks. [...]

Finding an MSP to Protect Yourself from Outsourcing IT Risks2019-05-31T12:51:55-07:00

Phishing for Your Destruction

A Timely Warning About Fake Communications and Persuasion Methods As many of us have experienced, there are people in the world who want to steal from us, our company or employer. In some cases, they want to pretend to be [...]

Phishing for Your Destruction2019-05-17T18:06:41-07:00

Antidotes to Physicians’​ IT Headaches

Blog written by Mimi Grant of ABL Organization. Originally published on April 3, 2019. Mimi discusses three common IT problems that physicians face and how to deal with them, including insights on ransomware attacks by Alvaka's CEO, Oli Thordarson. While [...]

Antidotes to Physicians’​ IT Headaches2019-04-26T18:53:31-07:00

Software Patch Management is Geographically Undesirable

Many organizations continue to find themselves between a rock and hard-place when it comes to consistently applying security updates or “patches” across their environments. On one hand, they recognize their unpatched software exposes them to risk of a disruptive and [...]

Software Patch Management is Geographically Undesirable2019-03-06T15:09:18-07:00

Challenges of Industrial Control System Cybersecurity

Today, industrial control system cybersecurity is mainly focused on securing networks, and efforts generally ignore process control equipment that is critical for plant safety and reliability, which leaves it woefully vulnerable. As the number and severity of attacks on our [...]

Challenges of Industrial Control System Cybersecurity2019-02-11T16:39:24-07:00

Ransomware v2.0 Recovery – Now, encrypted or deleted backups!

Warning!!! We have entered a new, even more malicious, era for ransomware that is hitting mid-market companies particularly hard. The two stories I share below are chilling… For the last five years or so, ransomware could be described as a [...]

Ransomware v2.0 Recovery – Now, encrypted or deleted backups!2019-03-20T15:00:40-07:00
Load More Posts