Lessons From Uber: How NOT to Respond to a Cybersecurity Incident

uber-car-image.png

After suffering a major data breach six years ago, you would think that a company like Uber would be ready for more cyberattacks, but here we are. How did we get here? [insert flashback music] It was late 2016. Cyberattackers quietly breached the security perimeter of Uber networks and accessed the personal data of 57 […]

Read more

Part 2: A Fictional Integrator, a Cyberattack and Next Steps

ransomware-cyberattack.png

When we last saw our intrepid integrator, they were working through some hard choices. Their company had fallen victim to a ransomware attack. They were locked out of all of their files, and the attackers were threatening to put all of their sensitive information on the internet if they didn’t pay a hefty ransom. What […]

Read more

A (Fictional) Integrator’s Terrible, Horrible, No Good, Very Bad Day

ransomware-attack.png

Unless you’ve been shortlisted for a Nobel prize or you’re waiting on the birth of a baby, early morning phone calls are never a good thing. When Joe (the owner of the company that I just made up in my head) got a call from Kate (his equally made-up service manager) at 6:30 a.m., he […]

Read more

SecuringAV: The Colonial Pipeline Ransomware Cyberattack — Part 1

Gas-Shortage-01.png

Why did the pipeline get shut down if the hackers only attacked the business end?  For each column in this series, rAVe writer Paul Konikowski takes a deeper dive into a recent security event or data breach, shedding light on supply chain vulnerabilities, infrastructure and cyber-physical security. By now, most people heard about the Colonial […]

Read more