Blog

What Are Recovery Time Objectives (RTO) Best Practices?  

Maximizing Business Resilience With RTO and RPO: A Guide to Best Practices The recovery time objective and recovery point objective are crucial elements for cybersecurity. With similar-sounding acronyms, both are significantly different. The Recovery Time Objective concerns the downtime your business can tolerate after an incident or a disaster. Recovery Point Objective, however, talks about […]

What Are Recovery Time Objectives (RTO) Best Practices?   Read More »

Strategies to Mitigate Single Points of Failure in SaaS IAM Solutions

Prepared by  Dr. Edward Amoroso Chief Executive Officer, TAG Infosphere Inc. Research Professor, NYU [email protected] www.tag-cyber.com Introduction The cybersecurity risk of having single points of failure (SPOF) in an IT infrastructure should be pretty obvious to any enterprise security practitioner. That is, if some malicious adversary can create serious problems by simply targeting a single

Strategies to Mitigate Single Points of Failure in SaaS IAM Solutions Read More »

McLaren’s ALPHV Ransomware Attack: What It Means for Healthcare

Healthcare’s Ransomware Crisis In the expanding realm of cyber threats, healthcare systems are finding themselves increasingly targeted. The recent ransomware attack on McLaren HealthCare, a prominent healthcare system in Michigan, offers a glaring testament to this disturbing trend. Breaking Down the ALPHV Attack McLaren HealthCare promptly launched an investigation upon detecting suspicious activities on its

McLaren’s ALPHV Ransomware Attack: What It Means for Healthcare Read More »

Okta MGM Hack: Okta’s Central Role and the Human Factor

Okta MGM Breach: ALPHV Breaks its Silence On 14th September 2023, News broke the story with an alarming update: the shadowy ransomware group ALPHV had released a detailed statement concerning their attack on MGM Resorts International. In their disclosure, ALPHV sought to correct the narrative surrounding the breach, shedding light on MGM’s vulnerabilities and offering

Okta MGM Hack: Okta’s Central Role and the Human Factor Read More »

Scroll to Top
Skip to content