Tracking cyber exposure requires detailed investigation to understand how a network has been breached and what data has been exposed to attackers. The following post explains how CYDEF investigates cyber exposure using our proprietary tool, SMART-Sentinel. 2020: Ending with a Surge of Breaches In the final months of 2020, global networks were inundated by a
CYDEF’s cyber security predictions for 2021, including ransomware expectations, cloud-based software risks, and budget impacts on cyber protection. CYDEF’s Cyber Security Predictions 2021 Around the new year, it seems blogs either are reviewing the year that’s ending or predicting the events of the coming year. I decided to try my hand at predicting the future.
Tips for selecting a managed detection and response company based on Actionable, Relevant and Timely response criteria. Selecting a Managed Detection and Response Company is a Complex Task Cybersecurity is often difficult to understand, especially for the average business owner. These people devote their time to managing their enterprise, not studying cybersecurity tactics and trends. Unfortunately, that means these
Adrozek, a drive by download attack, may be impacting your business’s browsers. From desktops to laptops to mobile devices, your endpoint security should be assessed. Detecting Adrozek’s Malicious Adware On December 10th, 2020, Microsoft announced detection of the malicious adware Adrozek on a variety of browsers, including Microsoft Edge, Google Chrome, Yandex Browser, and Mozilla
Cyber attacks at SolarWinds and FireEye underline the importance of cyber risk management. Breaches happen. The best action is strategic planning. Attacks Can Impact Any Business Regardless of preparation and perimeter defences, cyber attacks impact businesses of all sizes. Last week, a major provider of network management tools reported a significant cyber attack. Their build environment
Prevention is Not the (Only) Cure Risk management is the strongest cybersecurity tactic, outweighing the roles of prevention and detection. Our clients often indicate they’re looking for a solution that detects and blocks threats, while preventing infection. This may seem perfectly natural upon first glance. After all, what’s the point of detecting malware once your network is infected? An
On the Relationship Between Cheese and Risk In cybersecurity, there is a lot of talk of “defence in depth”, but sometimes it is unclear what people mean… or why you should care. This post answers questions about the concept of “defence in depth”, with unexpected help from a famous cheese family. What is defence in depth? Like many concepts in cybersecurity, defence in