Information Security

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threat incidents continue to worsen with the adoption of remote technologies and the growing sophistication of attacks. Palo Alto Networks published a report in May 2021 indicating that attackers are getting faster at identifying and exploiting vulnerabilities immediately after they are published. The researchers observed that, between January and March 2021, adversaries began scanning …

Why you should adapt the MITRE ATT&CK framework for threat intelligence Read More »

Navigating digital transformation & cybersecurity

The digital transformation wave is here, we’re in the middle of it, and cybersecurity needs to adapt matching the urgency, pace, and the delivery of new or improved digital products. Businesses are transforming across industries, focused on improving the quality and engagement of customer-facing products. cybersecurity needs to be a pressing concern that is ultimately …

Navigating digital transformation & cybersecurity Read More »

Have you updated your cyber policies for remote work?

We received a notice from one of our clients today detailing their expectations for vendors visiting their locations in this time of pandemic. It made me think about other policies that may need updating for the times. For instance, do your cybersecurity policies, standards, and procedures address remote work? If not, now is a good …

Have you updated your cyber policies for remote work? Read More »

Back view of business woman writing internet of things on white wall background, asian

Cyber security training for work at home employees, can it make a difference?

Last year I was going to write an article about being squeezed up next to somebody else on an airplane and how easy it was to see everything they were doing on their computer. As a security awareness trainer I was curious what a bad actor might be able to discover and take advantage of in such …

Cyber security training for work at home employees, can it make a difference? Read More »

Security Tips for Remote Work

Security tips for a remote workforce during COVID19

With the increased need to work from home and a heightened sense of urgency during this pandemic, more and more organizations are being affected by security events. Follow these suggestions to mitigate risk and keep your company secure. 1. Increase your vigilance The recent remote workforce boom has many people adapting quickly to change and …

Security tips for a remote workforce during COVID19 Read More »

Code on a computer screen

Replaying security: From manual test requests to test scripts

Kalles Group Pen Tester Stan Steenhuis, describes how the investment in constructing custom test requests can be turned into repeatable scripted tests. By adding this process into your pen testing methodology, you can easily develop your existing custom test collection and empower other pen testers on your team to perform these tests. Discovering a significant …

Replaying security: From manual test requests to test scripts Read More »

protect trade secret concept: folder secured with padlock

What everyone needs to know about the Equifax Breach

Author:  Nic Baus Everyone knows how precious your credit rating can be and how much it can swing you getting a loan for a house, car or even a simple retail credit card. There are three major credit reporting agencies that hold this control, Equifax, TransUnion and Experian. They have everyone’s personal information ranging from …

What everyone needs to know about the Equifax Breach Read More »

What happens when you incorporate artificial intelligence (AI) into a cloud-based fuzz testing service?

By Todd Barnes For those of you that may know Springfield does not refer to the lovely locale in Illinois, Missouri or even Oregon for that matter. Springfield for my context refers to the code name for what is now Microsoft Security Risk Detection (MSRD) – a newly released Security as a Service offering. Springfield …

What happens when you incorporate artificial intelligence (AI) into a cloud-based fuzz testing service? Read More »

Five security mistakes and how to prevent them

Sometimes it’s just a matter of changing your password more often. Security breaches have become distressingly common in recent years, compromising everything from employment records (security specialist RSA in 2011) to payment card information (Home Depot in 2014). And they’re becoming more complex and lethal, according to the recently released 2017 Verizon Data Breach Digest. …

Five security mistakes and how to prevent them Read More »