-
The Most Dangerous Threats to the Cloud

[et_pb_section bb_built=”1″][et_pb_row][et_pb_column type=”4_4″][et_pb_text admin_label=”The digital transformation has been powered by several factors” _builder_version=”3.7.1″] The digital transformation has been powered by several factors, the most important of which is the rapid move to the cloud. It is estimated today that 90 percent of organizations utilize some type of cloud service and that 60 percent of organizations […]
-
Ransomware Shuts Down Company

[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text admin_label=”Ransomware as a service (RaaS)” background_position=”top_left” background_repeat=”repeat” background_size=”initial” _builder_version=”3.7.1″] Ransomware as a Service (RaaS) Ransomware as a Service (RaaS) continues to threaten enterprises of all sizes. RaaS is provided by organized crime for other criminals to use. The primary software creator is responsible for fixing bugs, evolving […]
-
EU Strong Customer Authentication

Strong Customer Authentication The requirement for Strong Customer Authentication (SCA) went into effect this past September. Notwithstanding the deadline, several countries announced a delay in implementation which was approved by the European Banking Authority (EBA). SCA is a specific requirement of the Revised Directive on Payment Services (PSD2), originally issued in 2015 and subsequently amended […]
-
Deception Technology for Military and Defense

The U.S. DOD Cyber Strategy has evolved quickly to meet a broad mix of current and expected threats. Computer and network security controls and strategies are the foundation of new military warfighting strategies. They must be designed to gain and hold information advantage, to strike at any distance, and to enable reliable and secure global […]
-
Important Use Cases That Make MITRE ATT&CK Compelling

As we have discussed before in previous blogs, MITRE ATT&CK is a critical and important technology tools that can help you logically assess your security controls against the risks you are likely to face. It is critical for all of us to understand the gaps we have in your current cyberdefense. There are several important […]
-
Ransomware Deja Vu – Louisiana Declares State Emergency After Cyberattacks on Schools

On 24 July, 2019 the State of Louisiana actually had to declare a state of emergency over what appears to have been a ransomware attack against at least three of the school districts within the state. So far, the districts impacted include Sabine, Ouachita, and Morehouse parishes. The attacks seemed to impact various information technology […]
-
Deception Technology in Healthcare – When Good Medical Devices Go Bad

Healthcare institutions continue to be heavily targeted by cyber attackers. A review of the current data in the Department of Health and Human Services, Office for Civil Rights (HHS OCR), database of major breaches shows that cyber attackers continue to compromise our healthcare institutions more with each passing year. If you examine the HHS OCR […]
-
Beyond the Hype: AI in Information Security

In the next few years, Artificial Intelligence (AI) will transform and expand as a decision engine across every enterprise business layer from product development to operations to finance to sales. While, internet biggies like Google, Facebook, Microsoft and Saleforce are already embedding AI into their products, the Information Security (InfoSec) industry is also catching up […]
-
Reflections on a conferenceb &
This past week Ibve spent 30 hours in planes and countless more hanging around in security lines, Ibve been heated to the point of melting, tired to the point of sleeping while standing and stressed to the point of immobility (mostly my fault due to not getting all the slides finished until the last minute)b&and […]