3 Years Later: The Equifax Breach

On September 7, 2017, Equifax issued a breach notification. What was breached? Personal records for a staggering 145 million Americans, including Social Security Numbers, birth dates, addresses, and more. Before the end of the month, Equifax’s CEO, CI… Continue reading 3 Years Later: The Equifax Breach

How to Quickly Identify and Mitigate New and Changing Cyber Risks

Our customers often mention when we first meet that “we want to get away from days of delay that go by between a request for risk info and the response, and then action to mitigate the risk.” A series of events happened during the most recent Patch Tu… Continue reading How to Quickly Identify and Mitigate New and Changing Cyber Risks

The 20 Most Severe CVEs in Microsoft’s September 2020 Patch Tuesday Update

Fresh off the three day Labor Day weekend, many of you are dealing with the September 2020 release of Microsoft’s monthly Patch Tuesday updates. There are 129 updates in this month’s roll-up, a slight increase over the 120 released in August. Of those… Continue reading The 20 Most Severe CVEs in Microsoft’s September 2020 Patch Tuesday Update

Breach Risk Minimization for Under-Resourced Teams

CISOs that have enough budget and enough people on their teams have always been about as rare as hen’s teeth, but a confluence of challenges in today’s environment has made resource constraints even more painful for information security teams. Three p… Continue reading Breach Risk Minimization for Under-Resourced Teams

Top 9 Vulnerabilities With No Assigned CVE Number

The acronym CVE has become synonymous with vulnerability. And perhaps rightly so – it’s a convenient, unique identifier that makes it easy for people to exchange information about the vulnerability, and the state of that vulnerability within an organi… Continue reading Top 9 Vulnerabilities With No Assigned CVE Number

6 Factors to Consider in Evaluating CVE Importance

You just finished reviewing the latest report from your vulnerability scanner and surprise, surprise, way more vulnerabilities reported than your vulnerability management program can hope to mitigate. As always. So what’s an enterprising infosec profe… Continue reading 6 Factors to Consider in Evaluating CVE Importance

Exploited in the Wild, It Took Microsoft 734 Days to Patch this Vulnerability

On August 5, 2018, a malware sample, now known as Glueball (CVE-2020-1464), targeting Microsoft Windows was uploaded to VirusTotal. Upon investigating the issue, the sample was forwarded to Microsoft for further investigation. In January, 2019, VirusT… Continue reading Exploited in the Wild, It Took Microsoft 734 Days to Patch this Vulnerability

Two CISOs Pay $400k for Security, Yet One Spends 10x More. How?

New survey data shows that the majority (55%) of cybersecurity budgets are allocated towards reactive, rather than proactive, tools. Ask any infosec professional and they’ll tell you that a solid infosec strategy requires both reactive and proactive s… Continue reading Two CISOs Pay $400k for Security, Yet One Spends 10x More. How?

6 Keys to Ensuring Remote Employee Security

There are some amazingly high profile architectural landmarks that we meant to be temporary in nature. Believe it or not, famous structures such as The London Eye, the original Ferris Wheel, the San Francisco Palace of Fine Arts, and even the iconic E… Continue reading 6 Keys to Ensuring Remote Employee Security