The author discusses his company’s first-hand account of ransomware that hit the organization and how they navigated this difficult situation that many enterprises have found themselves in.
The Port of Los Angeles is creating a Port Cyber Resilience Center (CRC) that will help protect the organization's supply chain from cyber-related breaches. The CRC will be a maritime Security Intelligence and Operations Center (SIOC) to automate threat collaboration and extend its reach beyond traditional maritime stakeholders to Port stakeholders that are more broadly involved in cargo flow, such cross-sector companies.
Webcor, a provider of commercial construction services throughout California needed a way to find and mitigate threats, and reduce the company’s cyber risk profile. The company implemented a managed services approach to augment its existing IT and security staff and improve its security posture.
Altice Europe, a leading player in the convergence between telecom and media in France, services 23 million customers through its SFR division—Société française du radiotelephone—providing voice, video, data, internet telecommunications and professional services to consumers and businesses. The business-to-consumer (B2C) IT division of SFR deploys dozens of major projects each year, including web, front-end, and office applications.
DefenTec began as a managed services provider (MSP) before transitioning into a managed security services provider (MSSP). Now, in addition to optimizing their clients’ data environments through managed services, IT support and consulting, and cloud computing, DefenTec also fortifies them through a full range of managed security services, including secure Wi-Fidesign, network audits, and of course, password management. How does DefenTec use KeeperMSP to further guard their clients from cyberattacks?
EL AL Israel Airlines Ltd. has over 6,000 employees and is the national air carrier of Israel, carrying over 5.5 million passengers a year. EL AL faces cyberthreats on a regular basis and must maintain the highest levels of application security to prevent these threats from endangering the privacy and safety of its passengers.
Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway.