Blog Posts
Cyber Security Stories That Will Keep You Up At Night – Part II
Report Shows Pressing Danger of BEC Attacks On this the spookiest of all months, we once again delve into the realm of the unknown and terrifying for another instance of Cyber Security Stories that will keep you up at night. So gather around as we tell more...
Black Hat 2019
Black Hat 2019 is over. The event which takes place annually for the last 22 years, in Las Vegas, NV, hosted around 20,000 cyber security professionals this year. The day after Black Hat wraps up, the Def Con event takes place. Just to give you an idea of how Black...
What edition are we playing again?
Think back to when you were a kid, and the games you might have played, take a moment and think about your favorite game. If you were like the majority of us who were nerdy children who grew up to be interested in cybersecurity, you probably took part in some of the...
IT Disaster Recovery: Practice Makes Perfect
Testing your technology disaster recovery plan at regular intervals will help ensure that you’re ready for the next crisis. Automated testing is an important aspect of regular testing; however, also testing the people-dependent elements of your plan is the only way to...
Cyber Security Stories That Will Keep You Up At Night
It is a mistake to fancy that horror is associated inextricably with darkness, silence, and solitude. H. P. Lovecraft “They’re here.” “Who’s here?” “Bad Actors...” Cybersecurity horror stories, they don’t just occur, during Halloween, on a dark and stormy night, there...
Costly Data Breaches: British Airways
The European Union’s General Data Protection Regulation (GDPR) is showing its teeth. Today Britain's Information Commissioner's Office (IOC) announced they are fining British Airlines (BA), a part of International Airlines Group (IAG), $229.4 million dollars (£183.39...
Improve Cybersecurity with Blockchain
Blockchain technology may be new, but the innovative practical applications of these tools are predicted to burgeon the markets to somewhere between $20 billion and $176 billion by 2025. Why the huge gap between these two financial forecasts? Blockchain is an...
Security: Orchestration of Time
THREAT NOTIFICATION: In 2018 a Demisto survey of security professionals found that the average security team was bombarded with roughly 174,000 security alerts or threat notifications in a week. It was reported they were only able to effectively respond to roughly...
Top 5 IT Security Improvements You Need Now
ITSP Magazine called IT security in 2018 a “dumpster fire,” and we agree. From Russian state-sponsored hackers infiltrating the U.S. power grid, to ransomware continuing its ugly rampage, to programmer snafus that left millions of personal records exposed, it’s clear...
The Evolution of Phishing Scams — What to Watch for in 2019
Phishing is a popular tool used by cyber terrorists to infiltrate corporate IT networks. Because phishing attacks come in the form of an email message to an internal user in your company, they can rock your world with just one mouse click. Some of the most notorious...
The Building’s on Fire! Optimizing Procurement & Prioritizing Security
We open our discussion today with a scenario of a phishing attack, that has been plaguing a company for weeks now, let’s call them Firetronics. The CISO, CIO, and SOC have had several meetings about this attack, it seems they have an extremely persistent attacker. The...
The New Cyberwarfare: AI vs. AI
You’ve probably heard a lot about the powerful technology advancements found within the constructs of artificial intelligence (AI). From the adaptable automation known as machine learning to speech recognition (natural language processing), the algorithms behind AI...