5 Types of Cyber Crime Groups

5 Types of Cyber Crime Groups

The adage “teamwork makes dreamwork” extends to cybercriminals as well. To launch more successful cyberattacks, malicious actors with different specialized skills have conglomerated to form Cybercrime as a Service (CaaS). We’re now seeing people and groups specialize in various parts of the attack lifecycle. This means that we’re likely going to see less mistakes made leading to detections, and we should expect multiple groups colonizing an infected network. Within CaaS there are five types of…

Read More

Choosing a Hybrid Cloud Security Solution 101

Choosing a Hybrid Cloud Security Solution 101

The accelerated shift to the cloud was mostly borne out of necessity due to the influx of remote workers and changing customer demands requiring more business agility. According to Forrester, 94% of US enterprise infrastructure decision makers are using at least one type of cloud deployment. While there is a push to be cloud-native, the reality is that most companies will keep their “crown jewels” or critical systems on private clouds or on-prem, while leveraging…

Read More

Future Proof Your Business from Cybersecurity Threats

Future Proof Your Business from Cybersecurity Threats

In this blog, I’ll share two ways to shift our mindset from reactive to proactive cybersecurity as well as best practices to secure your attack surface against the most common cybersecurity threats. Cybercriminals adopt technologies long after businesses do Many feel that cybersecurity is a cat and mouse game with the threat actors able to constantly thwart the efforts of the cybersecurity community by introducing new tactics, techniques, and procedures (TTPs) whenever they need. It…

Read More

Cyber Insurance Coverage FAQ with DataStream CEO

Cyber Insurance Coverage FAQ with DataStream CEO

Common perception now points to the COVID-19 epidemic as the demarcation point for our new era for cybersecurity. This expansion of remote work and cloud services has widened the attack surface significantly and placed security leaders in a position to approach cybersecurity and cyber risk more proactively. However, the “new normal” hasn’t just affected the how IT security teams operate, as we’re seeing a hardening of the cyber insurance market. This is due to an…

Read More

3 Shifts in the Cyber Threat Landscape

3 Shifts in the Cyber Threat Landscape

Around the world, 2022 was a year of instability and conflict which added to the daily challenges faced by cybersecurity professionals. But they weren’t the only ones feeling the strain. Bad actors were also forced to adapt, trying to maintain “business as usual” by exploring new infiltration methods and by targeting more lucrative victims. Even if 2023 proves to be more predictable than last year, the cyber threat landscape is already undergoing big changes. To…

Read More

Bay Area Bank Collapse and the Cybersecurity Impact

Bay Area Bank Collapse and the Cybersecurity Impact

Expect Phishing Scams Like the click-bait-ish title I gave to this blog, recent news events are almost always used as part of phishing attacks. As other banks have experience difficulties, expect phishing scams to include mentions of recent bank failures. This makes for a good topic to phish for online banking credentials. Look out for lines like: “This is the FDIC, and you must claim your $225k deposit insurance within 24 hours,” or “This is…

Read More

Prevent Ransomware with Cybersecurity Monitoring

Prevent Ransomware with Cybersecurity Monitoring

Ransomware and other cyberattacks routinely take advantage of misconfigurations in cloud and IT systems and accounts. Tools that enable continuous, automated cybersecurity monitoring help close those gaps and strengthen overall attack surface risk management Continue reading the Ransomware Spotlight series:Ransomware Recovery Plan for 2023Fight Ransomware with a Cybersecurity AuditSecurity Patch Management Strengthens Ransomware Defense With authorities cracking down on cybercriminals, organizations refusing to pay cyber ransoms, and media stories touting ransomware’s decline, it could seem…

Read More

How Your Cybersecurity Strategy Enables Better Business

How Your Cybersecurity Strategy Enables Better Business

Historically, cybersecurity has the reputation of getting in the way of doing business. Few people are happy when required to change a password, or when told a proposed new application needs additional safeguards before it can be deployed. A recent Trend Micro global survey, Risk and Reward, found that 84% of respondents say cyber policies are impacting employees’ ability to do jobs in office; business being slower, difficulty accessing info, and general access to the…

Read More

3 Ways to Evolve Your Cybersecurity Operations

3 Ways to Evolve Your Cybersecurity Operations

What SOC teams need most are better ways to correlate and prioritize alerts so they can isolate the ones that truly matter while getting in front of threats instead of reacting to them. They also need to streamline their toolsets so they can manage more effectively. As a result, optimizing XDR, assessing risk continuously and shifting away from point solutions are critical. Step 1: Optimize XDR for stronger cybersecurity operations Most cybersecurity operations teams rely…

Read More

Establishing a Proactive Cybersecurity Plan

Establishing a Proactive Cybersecurity Plan

A recent survey with Sapio Research has revealed that 73% of respondents were concerned about the size of their digital attack surface. This overwhelming reaction to the current state of cyber threats affecting organizations is based upon a single fact: remote work. Due to expansions in WFA (work-from-anywhere) labor forces and organizational cloud services, the reality of being exposed to a cyberattack has migrated from “if” to “when.” This has ushered in a need for…

Read More
1 2 3 4 10