What’s in my ransomware jump bag
In my many years leading response to data theft and destructive cyberattacks, I learned the value of having a “jump bag.” The term, as old as my career in incident response, originally referred to a...
View ArticleBoost threat hunting and response efficiency with Cohesity and CrowdStrike
Security teams face an uphill battle in defending against today’s cyberattacks. In 2023, attackers adopted more effective methods, such as credential harvesting and vulnerability exploitation, to...
View Article3 things you can do to protect your data and recover from a cyberattack
Have you ever been trying to solve a complex problem when someone says, “Just do XYZ?” The word “just” bugs me because it is used far too often in IT and security and oversimplifies the solution....
View ArticleA guide for AI-powered data security: How to deliver breakthrough outcomes
What keeps you up at night? When we ask IT and InfoSec leaders this question, they usually respond with some combination of these three priorities: “My organization needs to be more resilient to...
View Article6 ways to improve your organization’s security posture
It’s October, which means Cybersecurity Awareness Month is here. Cybersecurity Awareness Month has been around since 2004 and aims to raise awareness about the growing threats and to promote best...
View ArticleCongratulations to the 2024 Americas Partner of the Year Award winners
I’m thrilled to announce the six winners from our global partner ecosystem for their remarkable performance and incredible achievements this past year. Throughout October, we will acknowledge their...
View ArticleBusted: Top 10 cybersecurity myths and misconceptions
By now, Cybersecurity Awareness Month has filled your inbox with emails from well-meaning parents who suddenly think cyber threats are a problem. Forgetting that this is the same person who just last...
View ArticleVisualize your datasets with Cohesity Gaia
Cohesity Gaia, our AI-powered conversational assistant, brings the power of generative AI to enterprise data, dramatically improving the speed and quality of insights available for various use cases....
View ArticleThe worrying increased collaboration between nation-states and ransomware gangs
Historically, there have been two main types of destructive cyberattacks: ransomware attacks conducted by financially motivated criminal actors and wiper attacks, also known as wiper malware, conducted...
View ArticleNation-state threat actors, ransomware gangs, and cyber resilience
As the lines between nation-state bad actors and ransomware gangs continue to blur, one thing becomes clear—cyberattacks will continue. It’s not a matter of if it will happen but when. Cyber resilience...
View Article