Tag: #databreach

  • Hacking Back With The Active Cyber Defense Certainty Act

    Hacking Back With The Active Cyber Defense Certainty Act

    H.R. 3270 …also known as the Active Cyber Defense Certainty Act (ACDC), will, if it becomes law, allow victims of hacking to execute self-defense outside of their networks. The essence of this bill was originally introduced in 2017 as H.R. 4036, which subsequently died in committee. Now it is back with new sponsorship and seems […]

  • Not all Anomalous Behavior is Malicious – Not all Malicious Behavior is Anomalous!

    Not all Anomalous Behavior is Malicious – Not all Malicious Behavior is Anomalous!

    Malicious behavior: we generally know it when we see it Most of the time, unfortunately, malicious behavior is hidden from view. Consider that the average dwell time for cyberattackers within networks is still measured in months. Per FireEye, the global median dwell time in 2018 was 78 days, down from 101 days in 2017, but […]

  • Protecting Industrial Control Systems From Cyber Attack – The Three Great Myths

    Protecting Industrial Control Systems From Cyber Attack – The Three Great Myths

    [et_pb_section fb_built=”1″ _builder_version=”4.4.8″][et_pb_row _builder_version=”4.4.8″][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.4.8″ custom_margin=”||||false|false”] The Threat to ICS in Context Industrial control systems (ICS) are the key infrastructure targets for nation-state attackers and fringe bad actors seeking to compromise or destroy public utilities and manufacturing industry operations. In some cases simple tools such as ransomware are deployed against this industrial infrastructure, […]

  • Acalvio-Blog-Deception Technology and Bank ATM

    Acalvio-Blog-Deception Technology and Bank ATM

    [et_pb_section fb_built=”1″ _builder_version=”4.4.8″][et_pb_row _builder_version=”4.4.8″][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.4.8″ header_2_font=”|600|||||||” header_2_line_height=”1.3em” header_3_line_height=”1.2em”] Deception Technology – Protecting Your Bankbs ATM Infrastructure Cyber attacks on automated teller machines (ATMs) have been running at full throttle for years. With over 3 million units, the automated teller machine remains a highly accessible and attractive target for cyber attackers. There are many […]

  • The Most Dangerous Threats to the Cloud

    The Most Dangerous Threats to the Cloud

    [et_pb_section bb_built=”1″][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”The digital transformation has been powered by several factors” _builder_version=”3.7.1″] The digital transformation has been powered by several factors, the most important of which is the rapid move to the cloud. It is estimated today that 90 percent of organizations utilize some type of cloud service and that 60 percent of organizations […]

  • Ransomware Shuts Down Company

    Ransomware Shuts Down Company

    [et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text admin_label=”Ransomware as a service (RaaS)” background_position=”top_left” background_repeat=”repeat” background_size=”initial” _builder_version=”3.7.1″] Ransomware as a Service (RaaS) Ransomware as a Service (RaaS) continues to threaten enterprises of all sizes. RaaS is provided by organized crime for other criminals to use. The primary software creator is responsible for fixing bugs, evolving […]

  • EU Strong Customer Authentication

    EU Strong Customer Authentication

    Strong Customer Authentication The requirement for Strong Customer Authentication (SCA) went into effect this past September. Notwithstanding the deadline, several countries announced a delay in implementation which was approved by the European Banking Authority (EBA). SCA is a specific requirement of the Revised Directive on Payment Services (PSD2), originally issued in 2015 and subsequently amended […]

  • Deception Technology for Military and Defense

    Deception Technology for Military and Defense

    The U.S. DOD Cyber Strategy has evolved quickly to meet a broad mix of current and expected threats. Computer and network security controls and strategies are the foundation of new military warfighting strategies. They must be designed to gain and hold information advantage, to strike at any distance, and to enable reliable and secure global […]

  • Important Use Cases That Make MITRE ATT&CK Compelling

    Important Use Cases That Make MITRE ATT&CK Compelling

    As we have discussed before in previous blogs, MITRE ATT&CK is a critical and important technology tools that can help you logically assess your security controls against the risks you are likely to face. It is critical for all of us to understand the gaps we have in your current cyberdefense. There are several important […]

  • Ransomware Deja Vu – Louisiana Declares State Emergency After Cyberattacks on Schools

    Ransomware Deja Vu – Louisiana Declares State Emergency After Cyberattacks on Schools

    On 24 July, 2019 the State of Louisiana actually had to declare a state of emergency over what appears to have been a ransomware attack against at least three of the school districts within the state. So far, the districts impacted include Sabine, Ouachita, and Morehouse parishes. The attacks seemed to impact various information technology […]