Ransomware Attacks

Untitled design-12
Risk Management

Who is Turla, What Just Happened, and Why Does it Matter for Your Company?

Background  Last month, the FBI infiltrated and neutralized the notorious Snake malware used heavily by Turla group. Turla is a hacking group that is part of the Russian domestic intelligence service, w...

Untitled design-11
Risk Management

The Cyber Insurance Labyrinth

Businesses and their boards are increasingly doubting the validity of cyber insurance and for good reason. The cyber insurance marketplace has become increasingly confusing, exclusionary, and expensive. The ...

May Newsletter
Monthly Newsletter

Consortium Networks Monthly Newsletter: May

May is a very exciting month here at Consortium Networks with a slew of birthdays and our new class of interns joining the team throughout the month. To kick off the month, this newsletter covers a wide array o...

ransomware primer

Ransomware: A Primer

There have been discussions about whether or not ransomware activity is on the decline, including by our own experts here at Consortium Networks, spurred by geopolitical activity and law enforcement actions, th...

Untitled design-10
Hearing Report

Hearing Report: Cybersecurity Vulnerabilities to the United States’ Energy Infrastructure Hearing Report

March 23, 2023 Full Senate Committee on Energy and Natural Resources Hearing to Examine Cybersecurity Vulnerabilities to the U.S. Energy Infrastructure Witnesses: Mr. Puesh M. Kumar: Director, Office ...

April Newsletter-2
Monthly Newsletter

Consortium Networks Monthly Newsletter: April

The Cherry Blossoms of DC have come and gone and, somehow, so has the month of March. The month kicked off with the much-anticipated National Cyber Strategy, spurring a flurry of activity in the cyber world. In...

News & Events

Ransomware Attacks Hit Louisiana and Tennessee

Ransomware attacks on colleges in Tennessee and Louisiana over the past two months have been swift and efficient. At least two colleges in Tennessee and at least five universities in Louisiana were hit with ran...

News & Events

3CX Supply Chain Attack: What you Need to Know

Supply chain attacks are an effective vector for attackers to get a big bang for their buck. Once a bad actor is in the network of a software or other supply chain organization, it can gain access to a large sw...

Policy Explainer

New EPA Mandatory Requirement Shows What’s to Come for Critical Infrastructure Cybersecurity Regulation

The Environmental Protection Agency (EPA) released mandatory regulations aimed at the cybersecurity of U.S. water filtration systems by requiring states to survey the networks governing drinking water filtratio...

higher ed
Risk Management

The State of Cybersecurity in Higher Education

The Catalyst Students at six different institutions of higher learning in Louisiana missed days to weeks of class this month because of cyberattacks. At one university, Southeastern University of Louisiana,...