Tracking Cyber Exposure

Tracking cyber exposure requires detailed investigation to understand how a network has been breached and what data has been exposed to attackers. The following post explains how CYDEF investigates cyber exposure using our proprietary tool, SMART-Sentinel. 2020: Ending with a Surge of Breaches In the final months of 2020, global networks were inundated by a

By |2021-01-14T14:10:32-05:00December 31st, 2020|Security Analysis, Threat Hunting|

Cyber Security Predictions 2021

CYDEF’s cyber security predictions for 2021, including ransomware expectations, cloud-based software risks, and budget impacts on cyber protection. CYDEF’s Cyber Security Predictions 2021 Around the new year, it seems blogs either are reviewing the year that’s ending or predicting the events of the coming year. I decided to try my hand at predicting the future.

By |2021-01-11T15:00:03-05:00December 31st, 2020|Cybersecurity, Predictions, Security Analysis|

The ART of Selecting a Managed Detection and Response Company

Tips for selecting a managed detection and response company based on Actionable, Relevant and Timely response criteria.  Selecting a Managed Detection and Response Company is a Complex Task Cybersecurity is often difficult to understand, especially for the average business owner. These people devote their time to managing their enterprise, not studying cybersecurity tactics and trends. Unfortunately, that means these

By |2020-12-23T17:50:07-05:00December 23rd, 2020|Cybersecurity, Managed Service Providers, SME|

Adrozek Silently Alters Search Results in Web Browsers

Adrozek, a drive by download attack, may be impacting your business’s browsers. From desktops to laptops to mobile devices, your endpoint security should be assessed. Detecting Adrozek’s Malicious Adware On December 10th, 2020, Microsoft announced detection of the malicious adware Adrozek on a variety of browsers, including Microsoft Edge, Google Chrome, Yandex Browser, and Mozilla

By |2020-12-22T17:21:48-05:00December 17th, 2020|Security Analysis, Threat Hunting|

Data Breaches: The Reality of Cybersecurity 

Cyber attacks at SolarWinds and FireEye underline the importance of cyber risk management. Breaches happen. The best action is strategic planning.   Attacks Can Impact Any Business Regardless of preparation and perimeter defences, cyber attacks impact businesses of all sizes.   Last week, a major provider of network management tools reported a significant cyber attack. Their build environment

By |2020-12-24T14:11:21-05:00December 17th, 2020|Cybersecurity, User Awareness|

Risk Management: The Strongest Cybersecurity Tactic

Prevention is Not the (Only) Cure Risk management is the strongest cybersecurity tactic, outweighing the roles of prevention and detection. Our clients often indicate they’re looking for a solution that detects and blocks threats, while preventing infection. This may seem perfectly natural upon first glance. After all, what’s the point of detecting malware once your network is infected? An

By |2020-12-10T15:38:37-05:00December 10th, 2020|Security Analysis, Threat Hunting|

Defence in Depth as a Cyber Risk Prevention Tactic

On the Relationship Between Cheese and Risk In cybersecurity, there is a lot of talk of “defence in depth”, but sometimes it is unclear what people mean… or why you should care. This post answers questions about the concept of “defence in depth”, with unexpected help from a famous cheese family.  What is defence in

By |2021-02-02T22:29:04-05:00December 3rd, 2020|Security Analysis, Threat Hunting|
Go to Top