This week we peer into the work of MSSP Alert’s own D. Howard Kass, and his asserting that clear knowledge gaps in organizations’ Cyber Security professionals have led to a fair share of the world’s cyber breaches, described at their website’s blogpost. As you can see, Kass’ post delves into the prevalent issue of human error […]
There is no shortage in the vast array of attack vectors and aspects of an organization vulnerable to malicious actors. As 2024 progresses, cyber criminals are only growing more advanced and becoming more and more skilled themselves. It is up to the cyber security professionals hired by an organization to combat and protect the organization […]
This week we take a peek at India News’ NDTV World‘s blog post regarding the then novel partnership between the United States federal government and the Indian Cyber-Defense program, a part of India’s national government. Could this sort of partnership be the future of official interconnected cyber security arms of the worlds nations? It is […]
This week we are looking at Michele Sandiford, from the Federal News Network, discussing the need for, and directives of Cyber Security in the U.S Federal Government. Coming from her post titled Cybersecurity starts in the security operations center, we begin with discussing the functionality of Cyber Security: what role does Cyber Security play in […]
Earlier this year in February, it was lauded by the UK’s The National Cyber Security Centre that never before seen tactics were seen being attempted by Russian cyber actors. In the blog post by the organization , we follow how the UK’s National Cyber Security Center, a group of 3rd parties referred to as the […]
The mere definition of a zero-day vulnerability fuels the nightmares of IT professionals across the globe. A zero-day vulnerability is one that is unknown to the platform or products owners or the party responsible for it, developers of such party, or anyone else capable of mitigating it. Recently, a zero-day vulnerability was discovered in nearly […]
This week we take a peek into Forbe’s own Emma Woollacott, where she made an inquiry into the state of Information Security at America’s largest companies with her post for Forbes 101, a series where articles are written describing a seemingly complex topic so the public can better understand them. The Chief Information Security Officer […]
Lauding themselves as a premier provider of secure email provider for small business, enterprise, educational and government institutions worldwide, Securence found themselves roiled in controversy as their claims regarding their email services backfired. Securence, the business-unit arm of the Minnetonka, MN, based Internet Service Provider, U.S. Internet Corp, “specializes in providing filtered, secure email services […]
Anyone in the cyber security should be well aware of the major Target data breach of 2013 when millions of customer credit and debit card records were stolen. Writers at Krebson Security reveal that this breach happened through access granted to an HVAC company that Target had contracted with, Fazio Mechanical Services. Though the breach […]
Today Clea Ostendorf from Code42‘s blog takes us into their Industry Insights section to discuss and take a good look at some real-life examples of the inside thread; people who pose a security risk from within your company. The post titled 11 Real-Life Insider Threat Examples is discussed as follows: Though it may not seem […]