Cybersecurity Countermeasures: Barriers to Risk Management

A discussion of The Law of Diminishing Returns and Cybersecurity Investment. The Cybersecurity Price Quandary A reasonably good anti-virus product with a bundled firewall can be acquired for less than a dollar per month. Some companies pay double that for an advanced endpoint detection product or a managed detection service. Larger companies frequently spend thousands

By |2020-12-03T16:39:21+00:00October 29th, 2020|Security Analysis, Threat Hunting|

Cybersecurity Risks Facing a Remote Workforce

Cyber threats face SMBs and large enterprises alike while the remote workforce keeps the economy alive. Threat Hunting with a Focus on Securing Devices There’s no disputing that the global pandemic has changed the way we work. Even those people employed by a business are working alone, using new tools, and relying on the digital frontier for success.

By |2020-12-03T16:38:18+00:00October 22nd, 2020|SME, User Awareness|

Combatting Cyber Alert Fatigue

The more endpoint breach alerts that sound, the less responsive a cybersecurity team becomes. The likelihood of an endpoint breach increases. Distinguishing Important Alerts from Noise Everyone experiences alert fatigue. Alert fatigue is such a common problem that it dates as far back as Aesop’s Fable from the 6th century BC: There once was a shepherd

By |2020-12-07T15:47:38+00:00October 15th, 2020|Security Analysis, Threat Hunting|

What ‘Endpoint Breaches’ Mean to your Small Business

A guide to endpoint threats and breaches for small business owners. Three Threats All SMB Owners Should Know About An endpoint is any remote device accessing your business network. This may include phones, laptops, tablets, watches, or any other mobile computing device. These endpoints are easy targets for cybercriminals. Mobile devices connect not only to

By |2020-12-03T16:37:02+00:00October 8th, 2020|SME|

Responding to Dridex

An analysis of Dridex, the 'banking' malware that steals credentials AND grows more sophisticated/discrete over time. How CYDEF Responded to a Dridex Attack The Dridex trojan posed a significant threat to major financial institutions since its identification in 2011. Unlike most malware, Dridex continuously evolves, growing more sophisticated over time and escaping detection by hiding

By |2020-12-03T16:26:47+00:00October 1st, 2020|Security Analysis, Threat Hunting|
Go to Top