Supply Chain Security

By | Security Operations

Organizations are constantly monitoring, detecting and trying to respond to alerts and potential threats to their environment from a broad number of sources. One source in particular that can be a bit elusive, and is much less discussed, is supply chain security.  Organizations spend a lot of time trying to understand when unauthorized devices are added to their networks, and…

Read More

Best Practices to Fortify Your Cybersecurity Strategy

By | Security Operations

There’s no question that the Denver Broncos beat the Carolina Panthers thanks to their defense. Defense alone carried the Broncos while Peyton Manning was out earlier in the season, and it carried them all the way through the post season, culminating in a 24-10 championship victory. The Broncos’ defense, in fact, is being referred to by some—like ESPN’s John Clayton—as…

Read More

10 Hard-hitting Cybersecurity Statistics

By | Security Operations

If one thing became clear in 2015, it was that no organization, regardless of its size or vertical, is safe from a data breach. A breach can happen to any organization at any time. Anthem, the IRS and Experian were some of the high profile organizations that were impacted by data breaches in 2015. Here are some of the most…

Read More

Student Hacking: A Threat, but a Bigger Opportunity

By | Security Operations

Over the years we’ve seen massive cyber attacks on renowned brands like Ashley Madison, Target, Sony and Home Depot; however, not all attacks are aimed against corporations. Some of today’s most noteworthy attacks are happening in the modern-day classroom as more school processes become Internet-enabled and, perhaps more importantly, as students become more skilled in the art of hacking. Case…

Read More

Cyber Attacks Are, Most Likely, an Inside Job

By | Security Operations

According to “The Federal Insider Threat Report,” published by MeriTalk, approximately 50 percent of federal agencies were targeted by inside threats in the past year. Forty percent were unintentional while the rest were malicious, resulting in unauthorized access to sensitive documents. Most important to note, however, is that one in three of these inside attacks were successful. This type of…

Read More

Automated Security Operations for Managed Security Service Providers (MSSP)

By | Security Operations

While the security automation conversation generally focuses on enterprise and government Security Operations Centers (SOC), one of the largest groups that can benefit from automation are Managed Security Service Providers (MSSP). MSSPs experience many of the same challenges that traditional SOCs do including: talent shortages, huge data volumes, data aggregation, case management, and reporting. But, they have it on a…

Read More

Cybersecurity and Incident Response for your Car?

By | Security Operations

The use of interconnected technology in our world is continuously on the rise; case in point, it is not uncommon for cars to be equipped with wireless features such as Bluetooth, Wi-Fi and keyless entry systems. These technologies allow for hands-free calling, built-in GPS systems and Internet access. Unfortunately, they also invite a way for hackers to access our personal…

Read More

Create Hurdles for Hackers with an Automated Incident Response Strategy

By | Security Operations

Hospitals are, understandably, home to extremely sensitive information, as well as top of the line technology in order to improve patient care. For example, many hospitals are upgrading their legacy infrastructure to adopt an integrated electronic health record (EHR) system in order to gain faster access to customer data that could very well save patients’ lives. As healthcare organizations embrace…

Read More

The 3 Scariest Breach Consequences for CIOs

By | Security Operations

Despite the recent rash of high-profile data breaches, research shows that many CIOs are still moving too slowly in their efforts to improve their organization’s security tools and best practices. A recent study from CompTIA, for example, found that only one-third of American businesses require cyber security training and that in more than half of those companies, the CIO makes…

Read More

Ashley Madison Breach Shows Ugly Side of Hacking

By | Security Operations

Hacks of retailers like Target and Home Depot caught the public’s attention and data breaches of financial institutions like J.P. Morgan were further reason for concern. More recently, breaches of government agencies—like the Office of Personnel Management—have served as a further wake-up call as to just how serious a threat cyber attacks are to the public’s privacy and safety. A…

Read More
 

Improve your Security Operations