Information Security

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threat incidents continue to worsen with the adoption of remote technologies and the growing sophistication of attacks. Palo Alto Networks published a report in May 2021 indicating that attackers are getting faster at identifying and exploiting vulnerabilities immediately after they are published. The researchers observed that, between January and March 2021, adversaries began scanning …

Why you should adapt the MITRE ATT&CK framework for threat intelligence Read More »

Infosec leader evaluating various information security frameworks for his organization's needs.

Which information security framework is right for my business?

Choosing the appropriate information security framework for your organization is important in protecting confidential or sensitive data, systems, and overall cyber resilience. With increasing regulatory requirements and an ever-evolving threat landscape, it is vital to devise a structured approach for safeguarding your assets and effectively managing your cyber risks. The right information security framework provides …

Which information security framework is right for my business? Read More »

Navigating digital transformation & cybersecurity

The digital transformation wave is here, we’re in the middle of it, and cybersecurity needs to adapt matching the urgency, pace, and the delivery of new or improved digital products. Businesses are transforming across industries, focused on improving the quality and engagement of customer-facing products. cybersecurity needs to be a pressing concern that is ultimately …

Navigating digital transformation & cybersecurity Read More »

Have you updated your cyber policies for remote work?

We received a notice from one of our clients today detailing their expectations for vendors visiting their locations in this time of pandemic. It made me think about other policies that may need updating for the times. For instance, do your cybersecurity policies, standards, and procedures address remote work? If not, now is a good …

Have you updated your cyber policies for remote work? Read More »

Back view of business woman writing internet of things on white wall background, asian

Cyber security training for work at home employees, can it make a difference?

Last year I was going to write an article about being squeezed up next to somebody else on an airplane and how easy it was to see everything they were doing on their computer. As a security awareness trainer I was curious what a bad actor might be able to discover and take advantage of in such …

Cyber security training for work at home employees, can it make a difference? Read More »

Security Tips for Remote Work

Security tips for a remote workforce during COVID19

With the increased need to work from home and a heightened sense of urgency during this pandemic, more and more organizations are being affected by security events. Follow these suggestions to mitigate risk and keep your company secure. 1. Increase your vigilance The recent remote workforce boom has many people adapting quickly to change and …

Security tips for a remote workforce during COVID19 Read More »

Code on a computer screen

Replaying security: From manual test requests to test scripts

Kalles Group Pen Tester Stan Steenhuis, describes how the investment in constructing custom test requests can be turned into repeatable scripted tests. By adding this process into your pen testing methodology, you can easily develop your existing custom test collection and empower other pen testers on your team to perform these tests. Discovering a significant …

Replaying security: From manual test requests to test scripts Read More »

Two cybersecurity professionals engaged in a conversation, discussing ways to mitigate IoT risks.

How to mitigate IoT risks using Zero Trust concept

  Sean Rosenberger wrote this article in 2017. The title was, “InfoSec and the Great IoT gold rush”. Ever since we have seen the Internet of Things revolutionize how we interact with technology and connect everyday devices and systems to the Internet. All in a bid to make our lives more convenient and efficient. However, …

How to mitigate IoT risks using Zero Trust concept Read More »

protect trade secret concept: folder secured with padlock

What everyone needs to know about the Equifax Breach

Author:  Nic Baus Everyone knows how precious your credit rating can be and how much it can swing you getting a loan for a house, car or even a simple retail credit card. There are three major credit reporting agencies that hold this control, Equifax, TransUnion and Experian. They have everyone’s personal information ranging from …

What everyone needs to know about the Equifax Breach Read More »

What happens when you incorporate artificial intelligence (AI) into a cloud-based fuzz testing service?

By Todd Barnes For those of you that may know Springfield does not refer to the lovely locale in Illinois, Missouri or even Oregon for that matter. Springfield for my context refers to the code name for what is now Microsoft Security Risk Detection (MSRD) – a newly released Security as a Service offering. Springfield …

What happens when you incorporate artificial intelligence (AI) into a cloud-based fuzz testing service? Read More »