Federal Agencies React To Colonial Pipeline, from Mitigating Crisis to Combatting Ransomware Threats

Federal Agencies React To Colonial Pipeline, from Mitigating Crisis to Combatting Ransomware Threats

Posted by Hubspot System on May 13, 2021

Following last week’s ransomware attack, restoring the operations of the Colonial Pipeline is now an all-hands-on-deck challenge, involving state and federal governments to jump in and find ways to manage […]

Read more

Executive Order Seeks Zero Trust Architecture, Improved Cloud Security

Executive Order Seeks Zero Trust Architecture, Improved Cloud Security

Posted by Jen Greco on May 13, 2021

The Biden Administration has issued an executive order regarding cybersecurity. This order is part of a series of executive actions that indicate the dire need for improved security. The order […]

Read more

Cybersecurity Industry Leaders Respond to Colonial Pipeline Ransomware Attack

Cybersecurity Industry Leaders Respond to Colonial Pipeline Ransomware Attack

Posted by Dawn Morrissey, Data Connectors CEO on May 12, 2021

As if pulled from a tabletop exercise, a ransomware attack has crippled the supply of gas throughout the Eastern United States. Panic and anxiety are spreading as gas prices are […]

Read more

Guest Blog: Can Our Industry Learn from the Colonial Pipeline Ransomware Attack?

Guest Blog: Can Our Industry Learn from the Colonial Pipeline Ransomware Attack?

Posted by James Saturnio - Ivanti on May 12, 2021

The following post was written by James Saturnio, Senior Lead Technical Market Advisor for the Technical Marketing Engineering team at Ivanti.

Read more

Cybersecurity Leaders Discuss Cross-Border Concerns, Protecting IoT Devices, Ransomware

Cybersecurity Leaders Discuss Cross-Border Concerns, Protecting IoT Devices, Ransomware

Posted by Data Connectors Newsroom on May 11, 2021

Virtual Summit Talks Data Security Requirements for Western Canada in the Wake of Colonial Pipeline Cyber Attack

Read more

Recent news posts

This is a sample blog post title.
Featured Image

Virtual Exhibit Booth Improvements: New Features and How to Use Them

This is a sample blog post title.
Featured Image

Florida Leading in Statewide Cybersecurity with $37M Budget

This is a sample blog post title.
Featured Image

Data Connectors Hosts LinkedIn Live Sessions

This is a sample blog post title.
Featured Image

When Love Hurts (Your Wallet): Understanding Romance Scams

This is a sample blog post title.
Featured Image

Vendor Partner Round-Up: The Anything-But-Ransomware Edition

Attend an Event!

Connect and collaborate with fellow security innovators at our Virtual Cybersecurity Summits.

Register Today

Page