Purpose Built for Air Gapped Environments In the backup and recovery software market, there is a troubling gap for US public sector customers operating in ‘no internet’ environments, including Department of Defense weapons testing sites, development labs / centers, training simulators, deployed tactical elements and
A Thanksgiving State-of-Mind As families across America prepare to gather around the dinner table and nurse some turkey and pumpkin pie-induced food comas in the coming days, our country has much to appreciate. This time of year provides a welcome opportunity to remember the unique
As the Department of Defense (DoD) and other US federal agencies seek to better protect themselves from pervasive and growing cyber threats, how can they maintain a security-oriented mindset when sourcing commercial off the shelf (COTS) products from outside vendors for use on sensitive networks?
Open Source Backdoors in the Wild Malicious actors will take advantage of any opportunity to exploit an attack vector for money, personal gain, or fun. For years, hackers have used supply chains to deploy backdoors because trusted software provides a relatively easy entry point. This
As you get your costumes and candy ready for Halloween, here’s another fun October fact – it’s National Cybersecurity Awareness Month! To help celebrate, Cyberfit Chip’s alter ego, Count Chipula, has turned to the good side this month, so he can offer up key tips to help
How do I love thee network engineer, let me count the ports. 3, that’s right just 3 ports (okay, maybe 5 if you want automated agent installs) you will need to open on your firewalls to get fantastic, fully functional data protection for your entire
A Gap in the Backup Market In today’s backup and recovery software market, there is a troubling gap for public sector customers operating in air-gapped, ‘no internet’ environments. In particularly challenging settings, like deployed defense elements at the edge or those with sensitive or classified
The Data Protection Evolution In the decades since cybersecurity became a key priority for companies and federal government agencies alike, we have witnessed a necessary evolution in information security doctrine and strategies. For years, layered data protection tools – from perimeter defense to identity management
Arizona’s Election Security Landscape With the 2020 campaign season well underway, US states are working hard to shore up their election systems before the upcoming primaries. Arizona has good reason to be a part of this nationwide reckoning: as Arizona’s Secretary of State Katie Hobbs
By now, you’ve undoubtedly heard the news. Last Friday, Texas became the latest addition to a very long list of US government targets victimized by ransomware. What makes this case stand out is the wide impact of the attacks, which targeted 23 different Texas municipalities in one coordinated sweep.