Rapid changes in the cyber-battlefield urge managers to treat cybersecurity as business issue and strategically protect their assets.
A major cyber war is on the horizon – how well are we prepared?
The cyber war encourages us to recheck the effectiveness of cybersecurity protection and make reliable and “bulletproof” backups.
Cyberwar is in a full swing – who is going to win?
Three civil servants employed in the intelligence service and the military were fined in the U.S. last week for involvement in cybercrime. They have been developing malware for a company in the UAE that performs cyberattacks for the UAE government.1 Is this a cyberwar? Cyberwar is a war where invisible attackers fight their victims, who […]
One Thousand Pentesters In a Box – Dream or Reality?
1000 bad guys per day… every day Not a day goes by lately when we can’t read news about breaches with damage estimations, about new vulnerabilities, about new innovative social engineering techniques, about enormous ransomware earnings, etc. Ensuring a strong security posture is really becoming a big challenge nowadays, so it is not surprising that […]
Remote work – 10 easy steps to protect your workers
Every bad has something good. The response to COVID-19 situation has put us into self-isolation but it also brought us together in communicating and collaborating from home for a while. And since working from home has many positive aspects, such as great time saving due to no commuting and hence less environmental pollution, COVID-19 could […]
Old-school awareness training does not suffice anymore
Even though we have many options today to protect ourselves against cybercriminals, more than 90% of all attacks start with “help” of an unwary employee. Clicking on a masked link or opening a malicious attachment unwittingly opens the door to a malicious user in an otherwise highly secure organization’s information environment. As such “negligence” companies […]
What’s Red Teaming? Is it a pentest?
Hey, man, what’s Red Teaming? Is it a pentest? The phrase “Red Teaming” has been increasingly mentioned in cybersecurity discussions. It sounds interesting, somewhat mysterious, contemporary, and offers a wide range of possible explanations for what it should actually mean. As I have repeatedly come across different opinions in my discussions with colleagues in the […]