Security Maturity Models Part 2: What is PRISMA?Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to... BLOG Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier... Security Maturity Models Part 1: What is Security & Privacy Capability Maturity Model? November 16, 2020 Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to... Security Through Obscurity November 13, 2020 Keeping an organization’s systems secure is the primary objective of its security team. Security teams implement various measures to achieve... Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the... What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first... OFAC Guidance for Ransomware Payments. LIFARS Q and A Session with David Tannenbaum October 13, 2020 OFAC: Ransomware Payments May Violate Sanctions Laws The Office of Foreign Assets Control (OFAC) issued an advisory to companies, DFIR... Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to... How to Plan, Conduct, and Manage Tabletop Exercises? September 30, 2020 A successful cyberattack impacts business operations, reputation, customer trust, and profitability. In the cyberspace, threats are evolving continuously, and tactics,... Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are... Communication During Incident Response September 25, 2020 When a cybersecurity incident occurs, it poses a direct threat to your organization’s business continuity. In a crisis, you cannot... Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not... Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another... Darkside: New Ransomware Operation Demanding Million Dollar Ransom September 10, 2020 Darkside, the latest ransomware operation to emerge has been attacking organizations beginning earlier this month. Darkside’s customized attacks on companies...
Security Maturity Models Part 2: What is PRISMA?Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to...
BLOG Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier... Security Maturity Models Part 1: What is Security & Privacy Capability Maturity Model? November 16, 2020 Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to... Security Through Obscurity November 13, 2020 Keeping an organization’s systems secure is the primary objective of its security team. Security teams implement various measures to achieve... Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the... What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first... OFAC Guidance for Ransomware Payments. LIFARS Q and A Session with David Tannenbaum October 13, 2020 OFAC: Ransomware Payments May Violate Sanctions Laws The Office of Foreign Assets Control (OFAC) issued an advisory to companies, DFIR... Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to... How to Plan, Conduct, and Manage Tabletop Exercises? September 30, 2020 A successful cyberattack impacts business operations, reputation, customer trust, and profitability. In the cyberspace, threats are evolving continuously, and tactics,... Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are... Communication During Incident Response September 25, 2020 When a cybersecurity incident occurs, it poses a direct threat to your organization’s business continuity. In a crisis, you cannot... Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not... Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another... Darkside: New Ransomware Operation Demanding Million Dollar Ransom September 10, 2020 Darkside, the latest ransomware operation to emerge has been attacking organizations beginning earlier this month. Darkside’s customized attacks on companies...
Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier...
Security Maturity Models Part 1: What is Security & Privacy Capability Maturity Model? November 16, 2020 Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to...
Security Through Obscurity November 13, 2020 Keeping an organization’s systems secure is the primary objective of its security team. Security teams implement various measures to achieve...
Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the...
What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first...
OFAC Guidance for Ransomware Payments. LIFARS Q and A Session with David Tannenbaum October 13, 2020 OFAC: Ransomware Payments May Violate Sanctions Laws The Office of Foreign Assets Control (OFAC) issued an advisory to companies, DFIR...
Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to...
How to Plan, Conduct, and Manage Tabletop Exercises? September 30, 2020 A successful cyberattack impacts business operations, reputation, customer trust, and profitability. In the cyberspace, threats are evolving continuously, and tactics,...
Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they...
Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are...
Communication During Incident Response September 25, 2020 When a cybersecurity incident occurs, it poses a direct threat to your organization’s business continuity. In a crisis, you cannot...
Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not...
Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another...
Darkside: New Ransomware Operation Demanding Million Dollar Ransom September 10, 2020 Darkside, the latest ransomware operation to emerge has been attacking organizations beginning earlier this month. Darkside’s customized attacks on companies...