fbpx

Richard Giddey

Shield representing protection against malware and ransomware

Navigating the Future of Data Protection: Addressing Reality Gaps and Long-term Retention Challenges

Introduction Hello again, I’m Richard Giddey, VP for the Asia-Pacific region at Actiphy. With an extensive history in storage and backup, I’ve been in the industry’s trenches, seeing its evolution firsthand. Today, let’s explore another critical dimension that directly impacts your data protection strategy—Data Protection. The Imperative of Long-term Data Retention Why Long-term Data Retention […]

Navigating the Future of Data Protection: Addressing Reality Gaps and Long-term Retention Challenges Read More »

Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs

Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs

In March 2022, the Securities and Exchange Commission (SEC) proposed a rule on cybersecurity disclosure, governance, and risk management for public companies, known as the Proposed Rule for Public Companies (PRPC). This rule would require companies to report “material” cybersecurity incidents within four days. It would also require that boards of directors have cybersecurity expertise.

Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs Read More »

National Cybersecurity Alliance Receives 200K Grant From Craig Newmark Philanthropies for HBCU Cybersecurity Program

National Cybersecurity Alliance Receives 200K Grant From Craig Newmark Philanthropies for HBCU Cybersecurity Program

August 28, 2023- WASHINGTON – The National Cybersecurity Alliance (NCA) today announced it has received a significant boost in funding from Craig Newmark Philanthropies. The $200,000 grant will support ongoing initiatives within NCA’s Historically Black Colleges and Universities (HBCU) Cybersecurity Career, Mentoring, and Scholarship Program, as students return to school. Launched in 2022, the ‘See Yourself In

National Cybersecurity Alliance Receives 200K Grant From Craig Newmark Philanthropies for HBCU Cybersecurity Program Read More »

Fake Signal and Telegram apps sneak malware into thousands of Android phones — delete these right now | Tom's Guide

Fake Signal and Telegram apps sneak malware into thousands of Android phones — delete these right now | Tom’s Guide

Hackers have developed a sneaky new tactic to push malware onto your phone and snoop on your conversations. Researchers at the cybersecurity firm ESET found fake apps in the Google and Samsung app stores that posed as extensions or premium versions of the popular messaging platforms Signal and Telegram designed to steal user data.  The

Fake Signal and Telegram apps sneak malware into thousands of Android phones — delete these right now | Tom’s Guide Read More »

Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience

Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience

DALLAS, Aug. 29, 2023 /PRNewswire-PRWeb/ — Everest Group is calling on enterprises to make the critical shift in focus from cybersecurity to cyber resilience. While cybersecurity focuses on safeguarding against threats, cyber resilience emphasizes the ability to withstand, respond and recover quickly from them. Everest Group issues this call to action in its recently published “State of the

Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience Read More »

Danger: This Android malware can unlock your phone and drain your bank account | Tom's Guide

Danger: This Android malware can unlock your phone and drain your bank account | Tom’s Guide

Hackers have created a new Android malware which can remotely wake up your smartphone, unlock the screen and then steal data as well as funds from your bank accounts in real-time. As reported by BleepingComputer, this new Android banking malware has been dubbed MMRat by security researchers at Trend Micro who first discovered it back

Danger: This Android malware can unlock your phone and drain your bank account | Tom’s Guide Read More »

Data From The Qakbot Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI

Data From The Qakbot Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI

Today, the US Justice Department announced a multinational operation involving actions in the United States, France, Germany, the Netherlands, and the United Kingdom to disrupt the botnet and malware known as Qakbot and take down its infrastructure. Beyond just taking down the backbone of the operation, the FBI began actively intercepting traffic from the botnet

Data From The Qakbot Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI Read More »

FBI, European agencies announce major takedown of hacker network that used Qakbot software - ABC7 Los Angeles

FBI, European agencies announce major takedown of hacker network that used Qakbot software – ABC7 Los Angeles

LOS ANGELES — The FBI and its European partners infiltrated and seized control of a major global malware network used for more than 15 years to commit a gamut of online crimes including crippling ransomware attacks, U.S. officials said Tuesday. They then remotely removed the malicious software agent – known as Qakbot – from thousands

FBI, European agencies announce major takedown of hacker network that used Qakbot software – ABC7 Los Angeles Read More »

Unleashing the Power of Data Archiving: Benefits for Companies and the Roadmap to Success

Introduction: In today’s data-driven world, businesses generate more data than ever. As this data accumulates, so does the need for efficient storage and management solutions. Data archiving, a practice that involves moving rarely accessed or inactive data to a long-term storage system, has become increasingly important for companies of all sizes. In this article, we’ll

Unleashing the Power of Data Archiving: Benefits for Companies and the Roadmap to Success Read More »

Scroll to Top