Blog Posts

Black Hat 2019

Black Hat 2019

Black Hat 2019 is over. The event which takes place annually for the last 22 years, in Las Vegas, NV, hosted around 20,000 cyber security professionals this year. The day after Black Hat wraps up, the Def Con event takes place. Just to give you an idea of how Black...

read more

What edition are we playing again?

Think back to when you were a kid, and the games you might have played, take a moment and think about your favorite game. If you were like the majority of us who were nerdy children who grew up to be interested in cybersecurity, you probably took part in some of the...

read more
IT Disaster Recovery: Practice Makes Perfect

IT Disaster Recovery: Practice Makes Perfect

Testing your technology disaster recovery plan at regular intervals will help ensure that you’re ready for the next crisis. Automated testing is an important aspect of regular testing; however, also testing the people-dependent elements of your plan is the only way to...

read more
Cyber Security Stories That Will Keep You Up At Night

Cyber Security Stories That Will Keep You Up At Night

It is a mistake to fancy that horror is associated inextricably with darkness, silence, and solitude. H. P. Lovecraft “They’re here.” “Who’s here?” “Bad Actors...” Cybersecurity horror stories, they don’t just occur, during Halloween, on a dark and stormy night, there...

read more
Costly Data Breaches: British Airways

Costly Data Breaches: British Airways

The European Union’s General Data Protection Regulation (GDPR) is showing its teeth. Today Britain's Information Commissioner's Office (IOC) announced they are fining British Airlines (BA), a part of International Airlines Group (IAG), $229.4 million dollars (£183.39...

read more
Improve Cybersecurity with Blockchain

Improve Cybersecurity with Blockchain

Blockchain technology may be new, but the innovative practical applications of these tools are predicted to burgeon the markets to somewhere between $20 billion and $176 billion by 2025. Why the huge gap between these two financial forecasts? Blockchain is an...

read more
Security: Orchestration of Time

Security: Orchestration of Time

THREAT NOTIFICATION: In 2018 a Demisto survey of security professionals found that the average security team was bombarded with roughly 174,000 security alerts or threat notifications in a week. It was reported they were only able to effectively respond to roughly...

read more
Top 5 IT Security Improvements You Need Now

Top 5 IT Security Improvements You Need Now

ITSP Magazine called IT security in 2018 a “dumpster fire,” and we agree. From Russian state-sponsored hackers infiltrating the U.S. power grid, to ransomware continuing its ugly rampage, to programmer snafus that left millions of personal records exposed, it’s clear...

read more
The Evolution of Phishing Scams — What to Watch for in 2019

The Evolution of Phishing Scams — What to Watch for in 2019

Phishing is a popular tool used by cyber terrorists to infiltrate corporate IT networks. Because phishing attacks come in the form of an email message to an internal user in your company, they can rock your world with just one mouse click. Some of the most notorious...

read more
The New Cyberwarfare: AI vs. AI

The New Cyberwarfare: AI vs. AI

You’ve probably heard a lot about the powerful technology advancements found within the constructs of artificial intelligence (AI). From the adaptable automation known as machine learning to speech recognition (natural language processing), the algorithms behind AI...

read more