Five Attack Scenarios That Could Alter the U.S. Election

On October 21, the FBI held a press conference alerting U.S. citizens about new details concerning nation-state interference with the upcoming U.S. elections. According to news reports attackers have gained access to stolen voter registration…
The po… Continue reading Five Attack Scenarios That Could Alter the U.S. Election

October is National Cybersecurity Awareness Month: Do Your Part. Meet Pam and #BeCyberSmart

October is National Cybersecurity Awareness Month (#NCSAM). Now in its 17th year, the month-long event promotes cybersecurity best practices and resources to help citizens stay safe and secure online. This year’s theme, “Do Your Part….
The post Octob… Continue reading October is National Cybersecurity Awareness Month: Do Your Part. Meet Pam and #BeCyberSmart

Prehistoric Security Controls: Deconstructing the Jurassic Park Insider Threat Incident

Cyber attackers are hitting organizations from every angle — and, increasingly, from inside. According to a 2020 Ponemon Institute study, the frequency of insider threat incidents spiked by 47% since 2018 and the average annual…
The post Prehistoric … Continue reading Prehistoric Security Controls: Deconstructing the Jurassic Park Insider Threat Incident

NSA and CISA Urge Action to Reduce Operational Technology Risk

The critical infrastructure that underpins our modern way of life continues to be under attack. The 2015 hack of Ukraine’s power grid brought this sobering reality into focus, and since then, threats have continued to…
The post NSA and CISA Urge Acti… Continue reading NSA and CISA Urge Action to Reduce Operational Technology Risk

Source Code Leak Lesson: Secure Development Environments

Once again we are seeing how vulnerable and easily development environments can be exploited with the recent news of a massive trove of leaked code from 50+ enterprises across multiple industries, including tech, finance, retail,…
The post Source Cod… Continue reading Source Code Leak Lesson: Secure Development Environments

7 Best Practices for Securely Enabling Remote Work

At Impact Live 2020 we spent a lot of time discussing strategies for maintaining a strong cybersecurity posture in the age of remote work. Today’s users need flexibility to do their jobs efficiently with the…
The post 7 Best Practices for Secur… Continue reading 7 Best Practices for Securely Enabling Remote Work

The Blurring Line Between Privileged and Non-Privileged Users

“Identity truly  is the new perimeter” was one of the big topics  at Impact Live. This is because  organizations are dealing with a new set of operational and security challenges related to introducing more endpoints…
The p… Continue reading The Blurring Line Between Privileged and Non-Privileged Users

What Twitter Attack Says on Human Nature, Social Engineering

Last week, Twitter suffered a breach that led to the compromise of numerous high-profile accounts, including those of Barak Obama, Joe Biden, Jeff Bezos and Elon Musk. I took the opportunity to speak with Nir…
The post What Twitter Attack Says on Hum… Continue reading What Twitter Attack Says on Human Nature, Social Engineering

You’ve Heard of Social Distancing? Now Try Risk Distancing

In recent months, social distancing has played a star role in virtually every aspect of our personal and professional lives. Most of us are working from home. In short order, parents were transformed into teachers…
The post You’ve Heard of Social Dis… Continue reading You’ve Heard of Social Distancing? Now Try Risk Distancing

Securing Success: Reporting PAM “Wins” Back to the Business

The director of Identity and Access Management (IAM) is fundamentally responsible for ensuring controls are in place to protect access to sensitive assets within the organization.  This includes all aspects of identity, access and authentication….. Continue reading Securing Success: Reporting PAM “Wins” Back to the Business