With remote work here to stay for many organizations, endpoint security has never been more crucial.
Biden Administration Appeals to Big Tech to Raise the Bar on Cybersecurity
Futurum Research Senior Analyst, Steven Dickens provides his take on the focus by the Biden Administration over the last few months and the meetings on Capitol Hill last week to address recent security breaches. With Big Tech being summoned to engage with the administration against a backdrop of cyberattacks and ransomware incidents becoming more high profile and frequent, a coordinated government and private sector response is becoming increasingly called for by a bi-partisan coalition of lawmakers.
T‑Mobile’s Massive Data Breach Impacts 100 Million+ T-Mobile USA Customers
Futurum analysts Steven Dickens and Shelly Kramer take a look at the massive T-Mobile data breach affecting some 100+ million T-Mobile USA customers. Their analysis includes a look at how the news broke, who has claimed responsibility for the attack and why, how an allegedly insecure backup server is the claimed point of entry and where and how customer data is being sold.
SUSE Earns Highest Level Accreditation for its SLES Linux Distribution, Doubles Down on Security
Futurum Research Senior Analyst, Steven Dickens provides his analysis of recent announcements by Linux Operating System vendor SUSE concerning the security posture of its core SLES Linux distribution. In a move that is a clear nod toward doubling down on security, SUSE has announced that SLES SP 2 has achieved EAL 4+ certification for the Arm, Intel x86-64 and IBM Z and LinuxONE platforms.
Accenture Falls Victim to Ransomware Attack Following Report of Increase in …. Ransomware
Accenture falls victim to ransomware attack following its recent report of increases in …. Ransomware. Irony that is not lost on Futurum lead analyst Shelly Kramer as she takes a look at the ransomware attack perpetrated by LockBit on one of the world’s largest tech consultancy firms.
What Does the Poly Network Hack Mean for DeFi
Futurum Research Senior Analyst Steven Dickens provides his take on the huge $600 million DeFi hack performed on the Poly Network. As the details of the hack become apparent Dickens takes a look at the details behind the hack and the wider implications for DeFi going forward.
IBM Storage Adds Enhanced Data Protection to FlashSystem Showing a Focus on Security, Ransomware, and Storage
Futurum’s Steven Dickens provides his analysis of IBM Storage announcements today, which reflect the company’s addition of enhanced data protection to Flash System, showing a focus on security, ransomware, and storage. While the company has some catching up to do, this focus on data protection and a Storage-as-a-Service offering is clearly important to clients and prospects
Check Point and Alibaba Cloud Raise the Multi-Cloud and Cloud Security Stakes
Check Point expands its Unified Cloud platform to support Alibaba Cloud elevating market awareness of its advanced security, visibility, and compliance capabilities of its cloud security portfolio, especially across multi-cloud environments. Futurum’s Ron Westfall examines why the Check Point’s integration of its CloudGuard solution with Alibaba Cloud strengthens its overall multi-cloud proposition and provides a marketing edge over rivals as well as how Alibaba Cloud benefits competitively from the Check Point relationship.
Full Impact of REvil Ransomware Attack on Kaseya Becomes Apparent
Futurum Research Senior Analyst Steven Dickens provides his analysis of the most recent supply chain ransomware attack that has affected thousands of businesses globally over the July 4th weekend.
HPE’s Project Aurora Launches, a New Zero-Trust Offering to Help Address Security Concerns
Futurum Senior Analyst Steven Dickens provides his take on news coming out of HPE’s Discover event around the latest zero-trust solution, Project Aurora. As the cybersecurity landscape evolves, new approaches are required to combat the emerging threats. HPE’s zero-trust approach is designed to deliver robust attestation and verification derived through a root-of-trust model at the silicon layer.