Blog Archives

Spear-Phishing Attacks: Why They Are Successful and How to Stop Them

White Paper: Spear-Phishing Attacks

Some of the most notorious cyber crimes in recent history — such as the attacks on major banks, media companies and even security firms — started with just one person clicking on a spear-phishing email.

Spear phishing is on the rise because it works.

Read more ›

Posted in Cybersecurity, Malware & Other Threats, Phishing, Risk Management
Tags: , , , , , ,

Cybersecurity Attack Surface – Part 1

Redefining The Cybersecurity Attack Surface, Part 1

by | Jan 4, 2016 | CYBERGOVERNANCE Journal

When discussing an organization’s security posture, “attack surface” is the common term used to describe the aggregate vulnerabilities that the firm exhibits.

Read more ›

Posted in cybergovernance, Cybersecurity, Fraud, Governance, Hacks, ID Theft, Malware, Malware & Other Threats, Phishing, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , ,

Inside vs Outside Malware

Telling the difference between insider versus non-insider malware

One of the most common and oldest threats is an attack by a trusted insider. These individuals might already have the access needed to be malicious, or, alternately, a local privilege escalation attack could give them easy access to sensitive data.

Read more ›

Posted in Content, Cybersecurity, Insider Threats, Layered Defense, Malware, Malware & Other Threats, Trojan
Tags: , , , , , ,

Cybersecurity and Compliance Vulnerabilities

Identifying and Defeating Cybersecurity and Compliance Vulnerabilities

Part of the cybersecurity community has considered this last incident (OPM) the equivalent of a cyber-9/11. In it, millions of data points belonging to US Government personnel were compromised, and there is a concrete threat that the stolen data could be used by threat actors in further cyber-attacks against additional Government agencies and individuals.

Read more ›

Posted in Compliance, Content, Continuous Monitoring, Cybersecurity, Fraud, Hacks, Insider Threats, Layered Defense, Malware, Malware & Other Threats, Risk Management, Vendor Compliance
Tags: , , , , , , , ,

Make Compliance Pain-free

Organizations are placing far too much emphasis on the compliance certification and not enough on the compliance process

by: Dan Maloney, for infosecurity

Perhaps the most surprising fact about last year’s slew of data breaches is that the organizations that made headlines were considered compliant with at least one of the common security frameworks,

Read more ›

Posted in Compliance, Content, Cybersecurity, Governent Oversight, Incident Response, Insider Threats, Layered Defense, Malware & Other Threats, Risk Management, Vendor Compliance
Tags: , , , , , , ,

SecondLook and the Myth of Linux Security

Linux security mythsLinux security mythsWe are well into the 21st century, but it is astonishing how people can still believe that Linux-based operating systems are completely secure. 

Read more ›

Posted in Content, Cyberattack, Cybersecurity, Hacks, Incident Response, Malware, Malware & Other Threats, Risk Management, Trojan
Tags: , , , , , , , , , ,

How Secure Are Your Email Channels?

Do Your Email Channels Put Your Cybersecurity and Compliance at Risk?

by Suhail Nanji, Area Director, Southeast Region  SMLR Group, Inc.

One of the best-kept secrets about email security is that most organizations don’t know all of the “users” using their email domain.

Read more ›

Posted in Compliance, Cybersecurity, Incident Response, Insider Threats, Malware, Malware & Other Threats, Phishing, Privacy, Regulatory, Trojan
Tags: , , , , , , ,

The Threat of the Malicious Insider

The Malicious Insider is already inside your defenses. How do you detect and defeat them?

by , Tripwire

Financial gain or fraud was the primary driver of the 11,698 instances of insider privilege abuse  defined as any unapproved or malicious use of organization resources in last year’s Verizon Data Breach Investigations Report.

Read more ›

Posted in Cybersecurity, Hacks, Incident Response, Insider Threats, Legal, Malware, Malware & Other Threats, Privacy, Privacy Laws, Regulatory
Tags: , , , , , , , , , , , ,

BYOD and Mobile Apps

The security threat of BYOD and unvetted mobile apps

by Suhail Nanji, Area Director, Southeast Region, SMLR Group

It’s likely happening in your organization, whether you have an official policy or not. Employees are probably running software applications on their own mobile devices or employer-issued devices to access company information.

Read more ›

Posted in Compliance, Content, Cybersecurity, Hacks, Incident Response, Insider Threats, Malware, Malware & Other Threats, Mobile, Regulatory, Vendor Compliance
Tags: , , , , , , , , , , ,

Fighting Cybercrime

Cybercrime and Digital Forensic Investigation: A Winning Combination

by Suhali Nanji, Area Director Southeast Region, SMLR Group, Inc.

Cyber insurance is one way organizations can fight cybercrime. Behind the scenes, however, laws and sentencing are getting tighter in response to the rise in cyber-attacks, while experts are creating more precise ways to identify cyber criminals.

Read more ›

Posted in Cybersecurity, Financials, Forensic Social Media, Fraud, Hacks, Incident Response, Legal, Malware, Malware & Other Threats, Phishing, Risk Management
Tags: , , , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: