Automated systems: Flag smarter, not everything

Imagine dealing with 1,000s of security alerts a day, whilst simultaneously juggling the tasks that are part of your day-to-day job. Challenging right? This is the current problem cybersecurity professionals are facing. Rather than making their jobs ea… Continue reading Automated systems: Flag smarter, not everything

Lateral phishing makes for dangerous waters, here’s how you can avoid getting caught in the net

As companies and consumers have become more aware of phishing, hackers have refined their techniques and are now launching a more advanced form of attack known as lateral phishing. This technique is highly convincing and, consequently, highly effective… Continue reading Lateral phishing makes for dangerous waters, here’s how you can avoid getting caught in the net

Your supplier’s BEC problem is your BEC problem

Business email compromise (BEC) scams are a burgeoning threat for organizations and, despite rising awareness, new victims are cropping up daily. BEC scammers don’t care what business the potential targets are in: all they care is that they have … Continue reading Your supplier’s BEC problem is your BEC problem

The FBI multi-factor authentication notification that should have never been

While reviewing the recent Private Industry Notification from the FBI about using social engineering and technical attacks to circumvent multi-factor authentication, I was floored at how each of these account takeover scenarios seemed completely preven… Continue reading The FBI multi-factor authentication notification that should have never been

The password reuse problem is a ticking time bomb

Despite Bill Gates predicting the demise of passwords back in 2004, they are still very much in use. Passwords, like email, seem future proof; but they are also the source of many cybersecurity problems. Key drivers of these issues are human behavior a… Continue reading The password reuse problem is a ticking time bomb

When is the right time to red team?

It takes a thief to catch a thief. Despite being hundreds of years old, this idiom holds perfectly true for that most modern of thieves, the cybercriminal. With adversaries consistently evolving their tools and techniques to overcome defensive solution… Continue reading When is the right time to red team?

Believe the hype, but control the threat: Reducing the risk of ransomware

Ransomware is becoming an epidemic for any collection or repository of data. Each day the attacks seem to be getting larger and more lucrative for cybercriminals. According to Europol’s annual report, the Internet Organised Crime Threat Assessment (IOC… Continue reading Believe the hype, but control the threat: Reducing the risk of ransomware

Speeding MTTR when a third-party cloud service is attacked

We all know you can’t stop every malicious attack. Even more troublesome is when an externally sourced element in the cloud – engaged as part of your infrastructure – is hit and it impacts customers using your digital service. That’s what h… Continue reading Speeding MTTR when a third-party cloud service is attacked

Cybersecurity workforce skills gap rises to over 4 million

The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million professionals, according to (ISC)2. The data indicates a necessary cybersecurity wor… Continue reading Cybersecurity workforce skills gap rises to over 4 million

November 2019 Patch Tuesday Forecast: Out with the old, in with the new

There are only two more Patch Tuesday’s before the new year, but we already have something new to experience this November. Windows 10 version 1909, named the November 2019 Update, was released recently on MSDN. Unlike previous fall releases, this one … Continue reading November 2019 Patch Tuesday Forecast: Out with the old, in with the new