We recently presented the webcast “Find Your Best Fit, Solving the Cybersecurity Framework Puzzle.” Tyler Reguly, who is a senior manager of research and development at Fortra and a former professor at his alma mater, Fanshawe College, served as the…
Category: Blog RSS Feed
Scams: Understanding vulnerabilities and protective strategies
Many people don’t realize that scams are complicated events orchestrated by scammers, which often include myriad persuasive techniques and take advantage of our individual characteristics and circumstances. While each scam varies in complexity, they typically progress through three broad stages,…
Over $40 Million Recovered and Arrests Made Within Days After Firm Discovers Business Email Compromise Scam
According to the FBI, billions of dollars have been lost through Business Email Compromise (BEC) attacks in recent years, so you may well think that there is little in the way of good news. However, it has been revealed this…
Have You Heard About the New PCI 4.0 Section 1.2 Spec? Tripwire Makes Compliance Easy
If you’ve been keeping up with the Payment Card Industry Data Security Standard (PCI DSS), you’ll know it has a new specification that revolves around network security controls. Let’s dig into the details. A Little Back Story It helps to…
Reliable Baseline Management with Fortra’s Tripwire Enterprise
When performing a security assessment, many folks will focus on asset management. This is an important first step, as it often reveals assets in the environment that were previously unknown. The next step in determining how to best secure the…
Tripwire Patch Priority Index for July 2024
Tripwire’s July 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the list are patches for Microsoft Office and Outlook that resolve remote code execution and spoofing vulnerabilities. Next are patches that affect components of the…
Hurricane Season Scams: What you need to know
Cybercriminals are notorious for their opportunism. No situation is off limits: whether they exploit conflict and human suffering, blackmail vulnerable individuals by threatening to leak therapy notes, or even bring healthcare organizations to their knees, cybercriminals will stop at nothing…
3 Types of Bot Attacks to Guard Against
Bot attacks constitute a major danger to businesses and individuals. For five consecutive years, the percentage of global web traffic connected to bad bots has increased, reaching 32% in 2023, a 1.8% increase from 30.2% in 2022, while human traffic…
Cybersecurity: The Unsung Hero of SOX Compliance
The Sarbanes-Oxley Act of 2002 (SOX) was enacted to restore public confidence in the wake of major corporate and accounting scandals. The legislation aims to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the…
$75 Million Record-Breaking Ransom Paid To Cybercriminals, Say Researchers
The staggering sum of US $75 million has reportedly been paid to a ransomware gang in what is believed to be the largest known ransom payment made by a cyber attack victim since records began. Researchers at Zscaler claim in…
#TripwireBookClub – From its Origins to its Future: How AI Works
In our continuing series of book reviews, the Fortra team read How AI Works: From Sorcery to Science by Ronald T. Kneusel. The book is advertised as unraveling “the mysteries of artificial intelligence, without the complex math and unnecessary jargon.”…
8 Daily Practices to Avoid Cybersecurity Burnout
Burnout happens when job demands such as workload, time pressure, and difficult clients are high, as well as when job resources, including quality leadership, autonomy and decision authority, recognition, and strong relationships, are lacking. The field of cybersecurity is particularly…
Re-Extortion: How Ransomware Gangs Re-Victimize Victims
Ransomware has evolved significantly since its inception. Initially, these attacks were relatively simple: malware would encrypt a victim’s files, and the attacker would demand a ransom for the decryption key. However, as cybersecurity measures improved, so did ransomware gangs’ tactics.…
Navigating PCI DSS 4.0: Your Guide to Compliance Success
The transition to PCI DSS 4.0 is here. The transition period from PCI DSS 3.2 ended on March 31, 2024, so businesses in all sectors must focus on aligning their practices with the new requirements. This blog will guide you…
SEXi / APT Inc Ransomware – What You Need To Know
SEXi? Seriously? What are you talking about this time? Don’t worry, I’m not trying to conjure images in your mind of Rod Stewart in his iconic leopard print trousers. Instead, I want to warn you about a cybercrime group that…
The Dual Impact of AI on Power Grids: Efficiency and Vulnerability
Artificial intelligence (AI) has emerged as a promising solution to modernize power grids. The technology, alongside other upgrades like Internet of Things (IoT) connectivity, could make energy infrastructure more reliable and sustainable. However, AI power grids also pose significant cybersecurity…
Securing Diverse Environments: Security Configuration Management
In our technologically advanced era, where cyber threats and data breaches are constantly evolving, it’s crucial for companies to focus on Security Configuration Management (SCM) to protect their resources and information. Whether dealing with infrastructure, cloud services, industrial installations, or…
The Importance of Ethics in Cybersecurity
Cybersecurity has become an integral part of our daily lives, impacting everyone around the world. However, the question arises: are rules and regulations alone sufficient to make cyberspace secure? Ethics, which are the principles that guide our decisions and help…
5 Phased Approach to Vulnerability Management: Best Practices
Vulnerability management is a foundational cornerstone for reducing your organization’s cyber risk, but what are vulnerabilities and why is it important to create a strong vulnerability management program? The National Institute of Science and Technology ( NIST) defines a vulnerability…
MitM Attacks: Understanding the Risks and Prevention Strategies
As our interactions with the digital world grow, connections will be established within seconds, leading to more online attacks. One type of attack we may be exposed to is known as a Man-in-the-Middle (MitM) — a technique cyber attackers use…
What are the Current Trends in Cloud Technology?
In recent years, cloud technology has become integral to business operations. Compared to on-premises infrastructure, it allows for improved scalability and flexibility, cost savings, collaboration, security, and data loss prevention. The cloud computing market is set to reach $679 billion…
HardBit Ransomware – What You Need to Know
What’s happened? A new strain of the HardBit ransomware has emerged in the wild. It contains a protection mechanism in an attempt to prevent analysis from security researchers. HardBit? I think I’ve heard of that before. Quite possibly. HardBit first…
Looking for a Job in Cyber? Tips and Advice From the Pros
A career in cybersecurity can be rewarding, challenging, and, frankly, lucrative. But it’s not the easiest industry to break into: the skills required for a cybersecurity role are both niche and specific, the bar for entry is relatively high, and…
Low-Hanging Fruits Vs. Those at the Top of the Tree: Cybersecurity Edition
Companies often go for high-end cybersecurity solutions because dealing with complex problems looks impressive. The appeal of fancy tech and advanced security challenges gives them a sense of achievement and a chance to show off their skills – and says…
The Role Regulators Will Play in Guiding AI Adoption to Minimize Security Risks
With Artificial Intelligence (AI) becoming more pervasive within different industries, its transformational power arrives with considerable security threats. AI is moving faster than policy, whereas the lightning-quick deployment of AI technologies has outpaced the creation of broad regulatory frameworks, raising…
5 Tips for Spotting and Avoiding Pig Butchering Scams
Pig butchering scams came onto the scene a few years ago and have been gaining momentum ever since. A unique take on an old classic, pig butchering is a typical investment scam with a romantic or relationship-based twist. The large…
Addressing Client-Side Risks in PCI DSS 4.0
It seems like such a short time ago that the Security Standards Council released the newest version of the Payment Card Industry Data Security Standard (PCI DSS). It has been a full year, and version 4.0 is now in effect.…
RansomHub Ransomware – What You Need To Know
What’s RansomHub? Despite first appearing earlier this year, RansomHub is already considered one of the most prolific ransomware groups in existence. It operates a ransomware-as-a-service (RaaS) operation, meaning that a central core of the group creates and maintains the ransomware…
Navigating Compliance: A Guide to the U.S. Government Configuration Baseline
For cybersecurity professionals tasked with defending the public sector, tackling the U.S. Government Configuration Baseline (USGCB) is just another hurdle to a safer federal tomorrow. Part of a wide collection of necessary federal government compliance requirements, it hones in on…
Sextortion Scams – How They Persuade and What to Watch for
“Sextortion” scams represent some of cybercriminals’ most brazen attempts to extract money from unwitting victims. These extortion techniques rely on fear and shame to get targets to pay up. Similar to individualized ransomware attacks, if the party refuses to pay…
VERT Threat Alert: July 2024 Patch Tuesday Analysis
Today’s VERT Alert addresses Microsoft’s July 2024 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1114 as soon as coverage is completed. In-The-Wild & Disclosed CVEs CVE-2024-38112 A vulnerability in the Windows MSHTML…
A Deeper Dive into DISA’s Cybersecurity Initiatives
The Defense Information Systems Agency (DISA) is a Department of Defense (DoD) service provider that supplies a global information-sharing architecture for all DoD members “from the President on down.” Their cybersecurity measures are among the best in the world. As…
Guarding Health: Errol Weiss on Protecting the Healthcare Sector from Cyber Threats
Each day, it seems that we hear of another healthcare organization being compromised by a cyber attack. It is clear that the healthcare industry is the new favorite target amongst cybercriminals. Fortunately, vigorous efforts are available to combat these threats.…
GAO Urges Stronger Federal Cybersecurity Measures Amid Rising Threats
The IT and OT systems that support not only federal governmental agencies but also national critical infrastructure must be protected, but developing a security strategy effective against threats is no easy feat. It can be difficult to cover all of…
Volcano Demon Ransomware Group Rings Its Victims To Extort Money
What’s happening? Security researchers have warned that a new ransomware group has taken an unusual twist on the traditional method of extorting money from its corporate victims. So what’s different this time? Whereas many ransomware attacks see a company’s company’s…
IoT Security Regulations: A Compliance Checklist – Part 2
In Part 1, the existing global regulations around IoT were introduced. In this part, the challenge of complying with these rules is examined. The IoT Security Challenge Securing the Internet of Things (IoT) presents complex challenges that stem primarily from…
Cybersecurity Best Practices for SOX Compliance
The Sarbanes-Oxley Act (SOX), enacted by the United States Congress in 2002, is a landmark piece of legislation that aims to improve transparency, accountability, and integrity in financial reporting and corporate governance. The act was a response to high-profile corporate…
Superior Integrity Monitoring: Getting Beyond Checkbox FIM
Contrary to what one might expect, creating a File Integrity Monitoring (FIM) system is pretty easy. Practically anyone with a modicum of Python, Perl, or development skills can write an app or script to gather a file’s checksum, compare it…
Tripwire Patch Priority Index for June 2024
Tripwire’s June 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the list are patches for Microsoft Edge (Chromium-based) and Chromium that resolve use after free, heap buffer overflow, and out of bounds write vulnerabilities Next…
A Look at Container Security Through the Lens of DevOps
Containerization has revolutionized application development, deployment, and management – and for good reason. The ability to automatically wrap an application and its dependencies into a single, easily deployable package helps developers focus on what they do best: writing code. Widely…
Cybersecurity Frameworks: What Do the Experts Have to Say?
Cybersecurity frameworks are blueprints for security programs. Typically developed by governmental organizations, industry groups, or international bodies, they take the guesswork out of developing defense strategies, providing organizations with standards, guidelines, and best practices to help them manage and reduce…
Better Resilience Sees More Extorted Companies Refuse To Pay Their Ransomware Attackers
There’s some possibly good news on the ransomware front. Companies are becoming more resilient to attacks, and the ransom payments extorted from businesses by hackers are on a downward trend. That’s one of the findings of insurance broker Marsh, which…
Defending Gold: Protecting the 2024 Olympics from Cyber Threats
As the 2024 Olympic Games in Paris approach, organizers are intensifying cybersecurity measures in response to warnings from experts and law enforcement agencies about a likely surge in cyberattacks. The Games, set to start on 26 July this year, are…
The 5 Industries Most Vulnerable to Data Breaches in 2024
As we pass the halfway mark of 2024, data breaches remain on the rise. Cybercriminals are finding more and more inventive ways to infiltrate organizations, exploiting vulnerabilities in networks, software, and human behavior. From phishing schemes and ransomware attacks to…
Zero Trust Maturity: How to Know When You’re Getting Close
Zero Trust maturity might be one of the least understood security buzzwords of our era. The term “Zero Trust” was originally coined over a decade ago and described the principle of not assigning digital trust to any entity, ever, for…
How Artificial General Intelligence Will Redefine Cybersecurity
Artificial Intelligence ( AI) is now integrated into almost every available technology. It powers numerous real-world applications, from facial recognition to language translators and virtual assistants. AI offers significant benefits for businesses and economies by boosting productivity and creativity. However,…
IoT Security Regulations: A Compliance Checklist – Part 1
The Internet of Things (IoT) refers to the global network of physical devices connected to the internet, capable of collecting and sharing data. IoT devices range from everyday household items to sophisticated industrial tools. By integrating sensors and communication hardware,…
Gaining Network Transparency with Asset Discovery and Compliance for IT/OT
I recently came across the ” Johari Window Model” and thought this would be a good way to gain inspiration to explain the conundrum faced by many cybersecurity customers. The table below shows us the breakdown of the stages that…
7 Challenges in Scaling SOC Operations and How to Overcome Them
In the past four years, cyberattacks have more than doubled. Cybercriminals are leveraging emerging technologies like artificial intelligence (AI) to facilitate more sophisticated attacks. Geopolitical tumult has increased cyber risk. Couple these factors with a near-ubiquitous desire for businesses to…
Qilin Ransomware: What You Need To Know
What is Qilin? Qilin (also known as Agenda) is a ransomware-as-a-service criminal operation that works with affiliates, encrypting and exfiltrating the data of hacked organisations and then demanding a ransom be paid. Qilin seems like a strange name. Where does…
Life in Cybersecurity: From Law Firm Librarian to Senior Cybersecurity Analyst with Tracy Z. Maleeff
We often interview InfoSec professionals who came to the profession from other areas of technology. Many network engineers, system administrators, and developers found it easy to make the transition to information security. The previous skills were easily applied to cybersecurity.…
How to Spot a Winning NERC CIP Project
The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) regulations often make exacting demands of Fortra Tripwire’s customers, requiring them to update or create new change processes and document those processes in order to comply. In any NERC…
Where Security Starts in Your Security Projects
The successful implementation of new tools and processes hinges not just on the technology itself but on meticulous project management. From ensuring secure access to the underlying infrastructure, a new tool will be implemented upon defining clear goals and understanding…
Tripwire Patch Priority Index for May 2024
Tripwire’s June 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Adobe. First on the list this month is a patch for Microsoft Windows Error Reporting (CVE-2024-26169). This CVE is listed in the CISA Known Exploited Vulnerabilities…
Cybersecurity Checklist: 9 Ways to Stay Safe on Your Summer Travels
As summer approaches, many of us are eagerly planning our much-awaited vacations. Whether you’re jetting off to exotic destinations or embarking on a road trip closer to home, it’s important to remember that cybersecurity should be a part of your…
Integrity and FIM: It’s More than Just Data Security
Integrity is a vital component of any cybersecurity policy, making up one-third of the CIA Triad. However, until recently, the industry has had a limited understanding of the term, using it primarily in the context of data security. Integrity means…
A Deep Dive into SELinux
Security-Enhanced Linux (SELinux), initially known for its perceived complexity in configuration and maintenance, has evolved into an indispensable security architecture across most Linux distributions. It empowers administrators to finely control the actions permitted to individual users, processes, and system daemons,…
Testing Banking Website Security: What You Need to Know
With 86% of UK adults using a form of online or remote banking and high street banks closing in record numbers, banking websites have become an integral part of our daily lives. They have changed how we manage our money,…
Watch Out! CISA Warns It Is Being Impersonated By Scammers
The US Cybersecurity and Infrastructure Security Agency (CISA) has warned that scammers are impersonating its employees in an attempt to commit fraud. In an alert posted on the CISA website, the organisation warned that so-called impersonation scams are on the…
Breaking Compliance into Bite-Sized Portions
Many companies strive to achieve the best security possible. Along the path to improved security, many companies are also required to meet various compliance standards. In some cases, compliance is also a regulatory requirement. This crossroad between security and compliance…
4 Things a Good Vulnerability Management Policy Should Include
The Verizon 2024 Data Breach Investigations Report noted a 180% increase in exploited vulnerabilities over the previous year’s figures. The importance of keeping an up-to-date vulnerability management policy for remediating and controlling security vulnerabilities cannot be understated. 1. Overview: Summary…
VERT Threat Alert: June 2024 Patch Tuesday Analysis
Today’s VERT Alert addresses Microsoft’s June 2024 Security Updates . VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1110 as soon as coverage is completed. In-The-Wild & Disclosed CVEs CVE-2023-50868 The only disclosed vulnerability we…
Mind the Gap: Strengthening Cybersecurity Through Behavioral Awareness
Exploring the intricate relationship between people and cybersecurity opens up a dynamic landscape where individuals’ decisions, habits, and intentions significantly impact the safety and integrity of digital systems. Cybercriminals are savvy opportunists, and like pickpockets, they go where the crowds…
Hit by LockBit? The FBI is waiting to help you with over 7,000 decryption keys
Did your company fall victim to the LockBit ransomware? Have cybercriminals left gigabytes of your data encrypted, with no easy route for recovery that doesn’t involve paying a ransom? Well, don’t fear. The FBI announced this week that it had…
What is the Standard of Good Practice for Information Security?
The ISF (Information Security Forum) Standard of Good Practice (SoGP) is a comprehensive set of best practices designed to help organizations effectively manage their information security risks. Covering various topics, including governance, risk management, compliance, incident management, and technical security…
What Is the Difference between FIM and DLP?
Threats to sensitive data are everywhere. From sophisticated cybercriminal syndicates to accidental exposure to nation-state-backed advanced persistent threat (APT) groups and everything in between, it’s never been more critical for organizations to have the correct data protection tools. When designing…
A Brief Look at AI in the Workplace: Risks, Uses and the Job Market
Anyone remotely wired into technology newsfeeds – or any newsfeeds for that matter – will know that AI (artificial intelligence) is the topic of the moment. In the past 18 months alone, we’ve borne witness to the world’s first AI…
Life in Cybersecurity: From the Classroom to the Next Generation of Cybersecurity Professional
When you speak with many of the seasoned veterans of cybersecurity, it is not unusual to learn of the twisted path in technology that eventually landed them in the security profession. However, the newest cybersecurity professionals are digital natives. They…
AI Autonomy and the Future of Cybersecurity
Have you ever wondered how Artificial Intelligence (AI) could mimic consciousness and autonomously control various tasks? It sounds rather daunting. However, it may not be as intimidating as it seems under the right conditions. Moreover, Would AI perform tasks independently…
Understanding Vulnerability Management and Patch Management
Vulnerability management and patch management are often confused. However, it’s crucial to recognize that, while complementary, they are distinct processes. Understanding the differences between vulnerability management and patch management is essential for a solid security posture. Let’s delve into the…
How Can FIM Protect Against Insider Threats
An insider threat is someone inside an organization – including current and former employees, partners, and contractors – who, intentionally or otherwise, put their organization at risk. They typically abuse their access to private information and privileged accounts to steal…
“Largest Botnet Ever” Disrupted. 911 S5’s Alleged Mastermind Arrested
A vast network of millions of compromised computers, being used to facilitate a wide range of cybercrime, has been disrupted by a multinational law enforcement operation. The 911 S5 botnet, described as “likely the world’s largest botnet ever” by FBI…
Data Destruction: The Final Line of Defense Against Cyber Attacks
Data is the lifeblood of modern organizations, and while watertight data protection policies are undeniably crucial, the need for robust data destruction methods has never been more pressing. Ultimately, all parties and vendors in your supply chain trust you to…
EU Is Tightening Cybersecurity for Energy Providers
The energy sector is having a tumultuous decade. During the COVID pandemic, the price of oil plummeted. In 2021, a ransomware attack forced one of the US’s most significant oil pipelines to cease operations for five days, causing a state…
Cloud Sprawl: How to Tidy It Up
Cloud computing offers indisputable benefits, but with the caveat that it can quickly become a disorganized jumble unless adequately managed. It’s common for the average organization to use dozens of cloud instances, solutions, and resources scattered across multiple platforms. Such…
Measuring the Effectiveness of File Integrity Monitoring Tools
A security incident can be the result of a single unauthorised change. A few may say, ‘one change is inconsequential, don’t sweat the small stuff.’ But when it comes to infrastructure security, the detail is of paramount importance! Just a…
How Criminals Are Leveraging AI to Create Convincing Scams
Generative AI tools like ChatGPT and Google Bard are some of the most exciting technologies in the world. They have already begun to revolutionize productivity, supercharge creativity, and make the world a better place. But as with any new technology,…
Achieving Automated TISAX Compliance
Cyberattacks on the automotive industry are becoming more sophisticated. In its 2024 Automotive Cybersecurity Report, Upstream found that 50% of all automotive cyber incidents in 2023 had a high or massive impact. Similarly, 95% of all attacks in 2023 were…
10 Years in Prison for $4.5 million BEC Scammer Who Bought Ferrari to Launder Money
A scammer has been sentenced to 10 years in prison for laundering over US $4.5 million obtained by targeting businesses and the elderly with Business Email Compromise ( BEC) and romance fraud scams. Malachi Mullings, a 31-year-old from Sandy Springs,…
Top 7 Cybersecurity Trends for Enterprises in 2024
How can an organization prepare to be cyber-resilient in 2024? The major trends to look out for seem to focus mainly on AI. While the rise of generative AI indeed poses challenges, executives should be cautious not to miss other…
HITRUST: the Path to Cyber Resilience
Much has been made of cyber resilience in recent years. And with good reason: failing to bounce back quickly from a security event can have dramatic financial consequences. In early 2023, Royal Mail took several days to recover from a…
The Interplay of AI and Cybersecurity: Survey Results
Artificial intelligence (AI) has a long and storied history. Ancient Greeks, for example, told stories of Talos, an enormous automaton that stood guard over Crete’s shores. In the 17th century, Gottfried Leibniz, Thomas Hobbes, and René Descartes explored the possibility…
The UK’s Cybersecurity: Where Is it and Where Is it Going?
In early April this year, the UK’s Department for Science, Innovation and Technology (DSIT) released its Cybersecurity Breaches Survey 2024. It provides a comprehensive overview of the UK’s cybersecurity landscape, exploring the different cyberattacks and cybercrimes businesses, charities, and private…
Making Data Integrity Easy: Simplifying NIST CSF with Tripwire
When you think of the cybersecurity “CIA” triad of Confidentiality, Integrity, and Availability, which one of those is most important to your organization? While the answer may vary by season for your organization, there is no argument that they are…
Closing the Skills Gap for Women in Cybersecurity
Cybersecurity is more important than ever. With a skyrocketing number of cyber threats and data breaches, organizations are always on the lookout for ways to strengthen their online defenses. However, one major obstacle the cybersecurity sector faces is a lack…
BreachForums seized! One of the world’s largest hacking forums is taken down by the FBI… again
Law enforcement agencies worldwide have coordinated to take down one of the world’s largest hacker forums, scoring a victory against cybercrime. BreachForums, a notorious marketplace for stolen data, was seized by the authorities on Wednesday, according to a message on…
Understanding the Key Differences Between FIM and EDR
File integrity monitoring (FIM) and endpoint detection and response (EDR) are two cybersecurity solutions that are often foundational aspects of organizations’ security strategies. EDR is implemented in order to stop known and unknown threats at endpoints, often with advanced functions…
Top 7 Technical Resource Providers for ICS Security Professionals
Attacks against industrial control systems (ICS) are on the rise. Cyberattacks are more prevalent, creative, and faster than ever. So, understanding attackers’ tactics is crucial. The IBM Security X-Force Threat Intelligence Index 2023 highlights that backdoor deployments enabling remote access…
VERT Threat Alert: May 2024 Patch Tuesday Analysis
Today’s VERT Alert addresses Microsoft’s May 2024 Security Updates . VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1106 as soon as coverage is completed. In-The-Wild & Disclosed CVEs CVE-2024-30040 Up first this month, we…
Insider Threats Maintain a Rising Trend
“When the cat’s away, the mouse will play,” the old adage goes. Filings to anti-fraud non-profit Cifas would support that claim, as Insider Threat Database (ITD) reports rose by 14% this past year and are largely attributable to hard-to-monitor work-from-home…
The Importance of Passive Asset Discovery
It’s the fifth requirement in CIS Control 1 : Use a passive asset discovery tool. Sounds simple enough. But what does it mean? And what, specifically, makes it so important that it became one of the first five requirements of…
The World Cybercrime Index: What is it and why is it important?
Cybercriminals are notoriously tricky to pin down. They are experts in obfuscation and misdirection, masters of avoiding consequences. Not since the early days of the Wild West have criminals managed to evade capture and maintain anonymity as effectively as modern…
FBI Warns US Retailers That Cybercriminals Are Targeting Their Gift Card Systems
The FBI has issued a warning to US retailers about a financially-motivated malicious hacking ring that has been targeting employees with phishing attacks in an attempt to create fraudulent gift cards. Staff at the corporate offices of US retail companies…
FBI Warns US Retailers That Cybercrimnals Are Targeting Their Gift Card Systems
The FBI has issued a warning to US retailers about a financially-motivated malicious hacking ring that has been targeting employees with phishing attacks in an attempt to create fraudulent gift cards. Staff at the corporate offices of US retail companies…
ANSI and the International Society of Automation Explained
As technologies advance and the world grows more complicated, collaboration and coordination have become increasingly important. Setting standards, sharing information, and bringing experts together are essential to safely developing technologies for national and global priorities, and the world needs organizations…
Hey, You. Get Off of My Cloud
The Rolling Stones wanted to protect their space; we, as security practitioners, need to protect ours. Data ‘castles’ in the cloud are out there, and they’re constantly under siege. By drawing inspiration from a band that embodied personal freedom, we…
Being Cybersmart is Always in Style
In 2022, the Security team at Microsoft published a cybersecurity awareness campaign named “# BeCyberSmart ”. Even though that was two years ago, the same best practices still apply. Cybersecurity is an important part of our daily lives and can…
Why Is Cyber Resilience Essential and Who’s Responsible for It?
In the first installment of our series on cyber resilience, we discussed what being a resilient organization means. In this installment, we’ll explore why organizations need to consider how to become resilient, who’s responsible for achieving this, and the processes…
Ensuring Privacy in the Age of AI: Exploring Solutions for Data Security and Anonymity in AI
With the widespread use of AI technology, numerous AI models gather and process vast amounts of data, much of which comprises personal information utilized to offer personalized experiences. However, this abundance of data poses inherent risks, particularly in terms of…
The Impact of NIST SP 800-171 on SMBs
From more broad laws like GDPR to industry-specific regulations like HIPAA , most organizations today must comply with some kind of data protection guideline. Some businesses may even have to comply with numerous data protection regulations. As such, compliance with…