The Digital Operational Resilience Act (DORA Act) outlines significant resilience changes for the financial sector. See how to comply here.
User Management
What to do if You’re Ransomware’d: A Healthcare Example
Cybersecurity expert James Cabe discusses what to do if you’re on the receiving end of a ransomware attack, including isolating systems.
Best Network Performance Monitoring Tools
This guide compares three of the best network performance monitoring tools by analyzing the most critical factors and discussing the pros and cons.
Breaking Down The 2023 Ragnar Locker Cyberattacks
Many organizations suffered Ragnar Locker cyberattacks in 2023. 30-year cybersecurity expert James Cabe discusses the problem and solution.
Dissecting the MGM Cyberattack: Lions, Tigers, & Bears, Oh My!
Casino giants in the US were hit by ransomware in September 2023. Cyber expert James Cabe breaks down the attack & how to recover.
What is a radio access network (RAN)?
This post provides an introduction to radio access networks (RAN) before discussing 5G RAN challenges, solutions, and use cases.
Operational Technology Security
This guide defines OT, explains how to overcome some of the biggest operational technology security challenges, and discusses the importance of recovery in building resilience in OT.
Medical Devices Cybersecurity Risk
Discussing the factors that make medical devices a cybersecurity risk before providing mitigation strategies to help healthcare organizations.
Zero Trust Security Architecture
This post defines a zero trust security architecture, discusses some of the gaps typically left in such an architecture, and provides tips for avoiding these pitfalls.
The Biggest Ransomware Attack You Haven’t Heard of…Yet
The most successful ransomware attack ever is happening right now. See why isolated management infrastructure is the only way to save your organization.