Cyber Risk News
With AI-based endpoint security solutions, it’s possible to prevent 99% of malware before it executes. Keep reading to see how easy it is to incorporate AI.read more
Network security threats are here to stay. Read more to learn about the enemy and how to be prepared for these network security threats.read more
If you are searching for a SIEM SOC – check out how you can use your SIEM and our SOC to get the best results. You’ll reduce your threat landscape in no time.read more
You probably need a cyber security assessment, especially if you are wondering whether you need one. Here are the top 5 reasons you should get started…read more
Do you need help learning how to simplify cyber threat management? Keep reading. We’ll give you the top 5 tools every company needs to be cyber-resilient.read more
There are so many types of internet threats today. Take a look at our comprehensive list of threats because you have to know what you are combatting…read more
Are you experiences any of these SIEM challenges? We get it. We see these every day and we are here to help. Do you agree…read more
People, Process, Technology in Cybersecurity or: How I Learned to Stop Worrying and Love the Process!
People, Process, and Technology is the cornerstone of ITIL, but can it also be used to ensure a proper cybersecurity foundation? The answer may surprise you!read more
Saying “My company is secure” is like saying “My team scored 27 tonight”. The metric doesn’t matter if you have nothing to compare it against. Enter the framework.
A framework is a standardized methodology for selecting, implementing, testing, and maintaining a set of security metrics, also called security controls. There are many frameworks to choose; NIST, ISO, NERC, PCI, etc., etc. The point is that you want to compare yourself against a known yardstick.read more
It’s no longer a matter of IF, but WHEN you will be attacked; companies similar to yours are experiencing breaches daily. Regardless of the size of your business, we are all a potential target for a hacker.
Enter the SIEM. You’ve selected the technology, implemented it, and are now collecting all the data on all security events that happen within your infrastructureread more
GDPR, or General Data Privacy Regulation, will come into force on 25 May 2018. GDPR requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance.read more
Given different challenges facing security departments, security monitoring is vital. Security professionals now feel the deck is stacked against them as cybercriminals continue to attack. Many organizations are outsourcing to third-party vendors for faster and better detection.read more
The business sector was the leader for the number of breaches in March 2018 with 45 breaches. These are breaches that are confirmed through media sources and/or notifications from state governmental agencies. The medical/healthcare industry had the second highest percentage of recorded breaches at 21 percent (19 breaches).read more
Based on a recent study on the State of the SOC, security practitioners from enterprise organizations are overwhelmed by the sheer volume of alerts and investigations that require their attention.read more
Do you remember the Meltdown and Spectre vulnerabilities that exploited critical vulnerabilities in modern processors in January 2018? It turns out the patch that Microsoft created for Meltdown could be worse than the original Meltdown vulnerability. Ulf Frisk, a Swedish penetration tester, warns in his blog:read more
SamSam, a ransomware that hackers use in targeted attacks, strikes again – this time shutting down the City of Atlanta. Hackers using SamSam usually scan the Internet for computers with open RDP connections. Attackers break their way into large networks by brute-forcing these RDP endpoints and then spread to even more computers. Once they have a sufficiently strong presence on the network, attackers deploy SamSam and wait for the victim organization to either pay the ransom demand or boot them off their network.read more
PHI data or Protected Healthcare Information data is a big deal for security people in the healthcare industry. Protected health information (PHI) under the US law is any information about health status, provision of health care, or payment for health care that is created or collected by a Covered Entity (or a Business Associate of a Covered Entity) and can be linked to a specific individual.read more
Have you considered the legal ramifications of a potential data breach if your organization is hacked? Let’s look at the Equifax breach. The most recent headline was about the insider-trading charges that were brought against a former employee. He sold stock and options after learning of the massive data breach at the credit reporting agency. What’s next for Equifax?read more
The legal industry is not necessarily the most prepared when it comes to cybersecurity, according to a new report. ALM Intelligence shows over the last three years:read more
Here is a list of the top, most shocking cyber crime statistics of 2018. You’ll be amazed at what can happen when you are unknowingly unprepared…read more
Top 5 most common network security threats. Be sure your organization has a plan to protect and/or prevent each of these malicious types of network security threats.read more
The EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 20 years. If your business handles data on EU residents then you must abide by the GDPR regulation.
The Information Commissioner’s Office (ICO) has released a checklist to help organizations prepare for the GDPR:read more
According to HIPAA, all covered entities and their business associates are required provide notification following a breach of unsecured protected health information. According to the report that lists all breaches reported within the last 24 months that are currently under investigation by the Office for Civil Rights, the top two types of attacks are hacking at 32.6 percent and unauthorized access at 21.3 percent.read more
Prevention is possible with the right people, processes, and technology. Your security stack is swamping you in alerts, it’s time to think beyond today’s security approach and get out of the endless loop of chasing attackers. There is a better approach!
Find out more about how Cybriant works with Cylance.read more
Once you have made the decision regarding your SIEM purchase, a key challenge is the skilled use of your SIEM tool. If you do not have the knowledge or expertise to utilize a SIEM correctly, your SIEM may not work optimally. We’ve heard complaints about an organization’s SIEM when it may the way it was implemented or managed on a daily basis.read more