Read or download all Datashield news, reviews, content, and more.
Datashield was recently featured on NPR, National Public Radio, on the local Arizona affiliate 91.5 KJZZ. The story covers the national rise in cyber-terrorism and cyberattacks, along with local news headlines from Datashield's home-state Arizona.
Datashield was featured in a recent story published by the Phoenix Business Journal. The story covers the cybersecurity landscape in the Valley and how we partnered with Bishop Fox to provide red and blue team defensive services.
The cybersecurity analyst has become the third most valuable job description in the technology industry. The increasing security incidents to IT infrastructure, the demand for accountability from end-users, and the financial cost of successful breaches are significant reasons enterprises and startups are taking cybersecurity seriously. Ambitious professionals who choose a career in IT security are reaping the benefits of securing operating systems and deployed IT infrastructure.
Ransomware is a form of malware cybercriminals use to encrypt data stored in computers or online servers. Cybercriminals demand payment to release the encryption key blocking the user from accessing the encrypted data. Payment is typically made through diverse mediums, including digital currency like Bitcoin. Once payment has been made, the victim is generally provided with instructions on decrypting their data.
Two cybersecurity powerhouses partner to provide defensive and offensive security services to boost enterprise companies’ security posture. Scottsdale, Ariz.— Datashield, a Scottsdale-based cybersecurity company, recently inked its partnership with offensive security services firm Bishop Fox. Both companies are based in Arizona and provide outsourced cybersecurity services to top Fortune 500 companies.
VMware ESXi and vCenter Server updates address multiple security vulnerabilities.
Datashield recommends patching any BIG-IP servers due to the recently released series of vulnerabilities, CVE-2021-22986 in particular, a pre-auth RCE in the iControl REST interface. An unauthenticated attacker can compromise the server and obtain access into the network. If your team is unable to patch these servers immediately, we recommend following the mitigation steps outlined in the notice sent out by F5, which is below as well.
Did you know that March 5, 2021 is the National Day of Unplugging?
Datashield recommends patching any Microsoft Exchange servers due to the recently released series of vulnerabilities, CVE-2021-26855 in particular, and the evidence of this exploit being utilized in the wild. An unauthenticated attacker can compromise the server and obtain access into the network. There is no current mitigation besides patching the affected Exchange servers. Datashield has deployed some initial detections for this CVE, but is still evaluating and creating new detections as we gather more information.
To go alongside our upcoming webinar, How to Get a Job in IT, Datashield is sharing open job positions within our company and our partners RSA, SentinelOne, Google Chronicle, ExtraHop, Microsoft, Proofpoint, Digital Shadows, and Vmware Carbon Black.
Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.
Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)
The Difference Between Cybersecurity & Network Security
Datashield, a Lumifi company, has been a leading managed cybersecurity services provider for over a decade. Our consultative process and approach to managed detection and response help our clients establish a truly resilient cybersecurity strategy.
Providing Managed Detection and Response (MDR), Outsourced SOC, SOC as a Service, Threat Hunting, Threat Validation, Threat Remediation, Endpoint Detection and Response (EDR), Email Protection, Device Configuration & Tuning, Vulnerability Management, Perimeter Defense and more.