Cyber Compromise in the Koreas? What Do Geopolitics Have to Do With My Cybersecurity?
The Macro Implications One of the many ways to parse the news regarding the compromise of South Korea’s chip manufacturers by nation-state actors is to look at the downstream risks to US entities, both in the public and private sectors due to our highly integrated supply chains. While US entities may not directly “consume” the […]
Read MoreCould a Cybersecurity Policy Have Prevented Your Last Security Breach?
A Vulnerable Target: Small Businesses in the Cyber Arena 36% of all cyberattacks in 2023 were specifically aimed at small businesses. This figure not only highlights the growing threat landscape but also underscores the critical need for these businesses to bolster their cybersecurity defenses. Small businesses often underestimate the sophistication of cyber threats, making them […]
Read MoreIs Your Business Ignoring Cybersecurity? The Risk You’re Taking Might Shock You
A recent study by Delinea has uncovered a concerning trend: over 50% of IT security decision-makers sideline cybersecurity, treating it primarily as a compliance checkbox rather than a cornerstone of business success. This insight, drawn from a survey of 2,000 professionals, highlights a critical misalignment between cybersecurity efforts and overall business objectives. Such an oversight […]
Read MoreMicrosoft was compromised. Are you next?
In a recent and unsettling turn of events, Microsoft fell victim to a cyber attack that sentshockwaves across the globe. NOBELIUM, also known as “Midnight Blizzard,” is a Russianstate-sponsored group and was found to be responsible for this calculated attack. Forcountless individuals and businesses relying on Microsoft’s vast array of services, thisincident is more than […]
Read MoreDemystifying Cal-Secure – Part 2
In Part 1 of the Demystifying Cal-Secure series, we understood when Cal-Secure is needed, who it applies to and so on. Now let us move to what it entails: Cal-Secure covers the people, processes, and technology that must be addressed by the executive branch. Cal-Secure is designed to be utilized by state government agencies and […]
Read MoreZero Trust Architecture in Operational Technology Environments
Many large enterprise organizations are adopting the Zero Trust Security Model for their network architectures. The Zero Trust Model is a concept that suggests organizations should not automatically trust anything inside or outside their network perimeters. There is no single set of controls that will achieve Zero Trust. However, as described by the model, there […]
Read MoreWhat is XSS (Cross-Site Scripting)?
In the world of websites, scripts play an essential role in defining the behaviours of websites and web applications. Although scripts are invisible to viewers, they handle things such as the video player on YouTube, what happens when you click the hamburger icon, what happens when you enter your contact information or credit card information, […]
Read MoreWhy do Small Businesses need Security Policies?
Protecting confidential data for small businesses and new startups can be a considerable challenge. Cyber security policies are critical for small businesses as not everyone in the company knows what data needs to be protected and how they can help protect the data.
Read MoreVirtual CISOs – A cost-effective strategy
This model of a vCISO is ideal for start-ups, small and medium businesses, and other businesses in growth mode. In the end, cyber security is a people business, and vCISOs need to win the hearts and minds of the people they work with. They should be viewed as partners to help the organization be secure and identify its resource needs – be it additional training, people, establishing new processes, budgets, etc.
Read More