previous arrow
next arrow
Slider

Blog

By Claroty APJ

Ransomware attacks in operational technology (OT) environments are becoming increasingly common as they demonstrate the impact they can have on production processes – shutting down production lines, industrial processes and resulting in revenue loss. In its 2019 Security Report, Telstra said its research showed ransomware to be a growing problem

By James Arthur

There’s a saying in the cyber security industry about cyber attacks: “It’s not personal’’. As the scale and maturity of cyber attacks grows, affecting businesses of all sizes across every industry, it’s tempting to ask: Why? Why now? Why us? Why this type of attack? The reality is that cyber

By Dan Fries

How do you know if your business is safe and secure online? Measuring how effective your cybersecurity is can be tricky for small businesses. Cybersecurity firms make use of complex key performance indicators (KPIs) to measure how effective their security tactics are, but building these systems is generally beyond the

By NICOLE LINDSEY

In a dramatic new escalation of cyber espionage activities occurring around the world, hackers now appear to be going after software companies in so-called “supply chain attacks.” The primary goal is to infect as many computers as possible worldwide by going after popular software vendors. The most recent victim of

By Paige H. Adams

Cybersecurity leaders are also business leaders, working to protect data without business interruption. But the complexities and magnitude of today’s cybersecurity challenges are daunting for many organizations and not every executive is a cybersecurity professional, nor do they necessarily need to be. What’s important is that those with the primary

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.