Managing The Ransomware Threat


Ransomware continues to be a real threat to business operations across all industries, no organization is safe from this threat. The combination of widely available exploit kits on the dark web, limited resources and skills needed to execute attacks, and potential financial gain makes ransomware attractive to bad actors. The intent of this post is … Continue reading Managing The Ransomware Threat

Risky Bits #2


Risky Bits provides a brief summary of interesting cybersecurity considerations that help to enhance the protection of data and technology. There is no shortage of cybersecurity information available on the web – vulnerability alerts, threat notifications, products, and services. The list is purposefully simple and based on the most common challenges we experience. The information … Continue reading Risky Bits #2

CCPA: Insights Into Applicability and Preparation


The California Consumer Privacy Act (CCPA) is a new regulation on the horizon that organizations must understand and, if applicable, take action to comply. CCPA becomes effective January 1, 2020 and time is running out. The intent of this post is to provide insight into what CCPA is, how it applies, and key considerations for … Continue reading CCPA: Insights Into Applicability and Preparation

Risky Bits #1


Risky Bits provides a brief summary of interesting cybersecurity considerations that help to enhance the protection of data and technology. There is no shortage of cybersecurity information available on the web – vulnerability alerts, threat notifications, products, and services. The list is purposefully simple and based on the most common challenges we experience. The information … Continue reading Risky Bits #1

Decoding the Hacker Mentality to Improve Security Effectiveness – Insights from the Black Report


There are many reports and research findings on threats and breach trends. However, there are few insights into the hackers that carry out attacks. What are their motivations? What are their preferred tactics, techniques, and procedures (TTPs)? Nuix issues an annual report to address some of these questions. The 2018 Black Report stands out because … Continue reading Decoding the Hacker Mentality to Improve Security Effectiveness – Insights from the Black Report