Podcast Episode 9: Sharpening Your Defenses With MITRE ATT&CK’s New Sub-Techniques

Jen Burns, lead cybersecurity engineer at MITRE, walks us through the MITRE ATT&CK© Framework and discusses some important changes brought by a July 2020 update. She then highlights what the security community can expect to see in a couple of … Continue reading Podcast Episode 9: Sharpening Your Defenses With MITRE ATT&CK’s New Sub-Techniques

Tripwire Patch Priority Index for July 2020

Tripwire’s July 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, F5 Networks, Cisco, and Oracle. Up first on the patch priority list this month are patches for F5 Networks and Cisco for vulnerabilities tha… Continue reading Tripwire Patch Priority Index for July 2020

Using Good Cyber Practices to Frame your Personal Cyber Narrative

Someone in my Twitter timeline wrote a post that resonated with me. Instead of advocating the idea of our firms mandating what we can and cannot do in our homes as working from home (WFH) standards, she said how gracious it was for us to let the firms … Continue reading Using Good Cyber Practices to Frame your Personal Cyber Narrative

Politician Amongst Those Who Had Their Direct Messages Accessed During Twitter Hack

More information has emerged related to last week’s attack which saw a number of high profile Twitter accounts hijacked for the purposes of spreading a cryptocurrency scam. Twitter has already said that 130 Twitter accounts were targeted by hacke… Continue reading Politician Amongst Those Who Had Their Direct Messages Accessed During Twitter Hack

The Cyber Risks of Remote Workers Returning to the Office

The COVID-19 pandemic has created a huge list of challenges for businesses. One that is potentially going unnoticed or under-reported is cybersecurity. Specifically, as lockdown ends and as individuals return to offices and places of work, it may be th… Continue reading The Cyber Risks of Remote Workers Returning to the Office

Understanding the Benefits of the Capability Maturity Model Integration (CMMI)

“Cybersecurity is the leading corporate governance challenge today, yet 87% of C-suite professionals and board members lack confidence in their company’s cybersecurity capabilities. Many CISOs and CSOs focus on implementing standards a… Continue reading Understanding the Benefits of the Capability Maturity Model Integration (CMMI)

Are You Ready To Automate Your Cloud Account Security?

A Security Analyst, A Lead Developer, And A Cloud IT Admin Walk Into A Bar… Stop me if you’ve heard this one before. When we talk to users about the ways that they handle roles and responsibilities associated with keeping their Cloud accoun… Continue reading Are You Ready To Automate Your Cloud Account Security?

Top 5 Cybersecurity Risks with Cloud Migration

The demand for cloud computing has skyrocketed in recent years. Lower costs, a faster time to market, increased employee productivity, scalability, and flexibility are some of the beneficial factors motivating organizations to move to the cloud. It&#82… Continue reading Top 5 Cybersecurity Risks with Cloud Migration

The Twitter mega-hack. What you need to know

What the heck has happened on Twitter? Twitter accounts, owned by politicians, celebrities, and large organisations suddenly started tweeting messages to their many millions of followers, at the behest of hackers. What did the messages say? Here is a t… Continue reading The Twitter mega-hack. What you need to know