FEATURED BLOG
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.
Alphv (Blackcat) Using Malicious Windows Drivers
Using Signed Windows Driver to Deploy Ransomware
Getting Started with Security Governance for SMBs
Getting Started with Security Governance for SMBs
SecureWorld Philadelphia 2023 lived up to the hype!
Secure World Philadelphia 2023 lived up to the hype!!!
Let's Talk Ransomware
Many organizations find themselves in a position where customers are asking for an independent certification”
Phishing, Ransomware, Breaches: Protect Your Organization
Securing our resources is critical. This blog will highlight what companies – both big and small – can do now, and in the future, to help protect their information assets.
Multifactor Authentication and You
Matt Barnett and Founder and CEO of Cyberblack, Brett Hodges, analyze the Colonial Pipeline attack in the weeks since the massive shutdown caused fuel prices to surge and incited panic buying across the country. This episode of the 7X Files digs into what we can learn from this attack and what can you do to ensure your organization isn’t the next victim.
So, You're Curious About ISO27001
Many organizations find themselves in a position where customers are asking for an independent certification of their organization’s controls. Sometimes they are given choices – SOC 2, HITRUST, or ISO27001. While you’ll hear these terms thrown around quite a bit, many US companies have much to learn about ISO27001.
Losing Sleep Over CMMC? Read This.
CMMC is causing quite a buzz and looks to be the information security industry's next ‘big thing’. Luckily, most of what is outlined in the CMMC are things most organizations should be doing already.
Source Code for Windows XP, 2003, and More Leaked
For almost 20 years, you thought it was a well-guarded secret... until now. 43GB of source code for many end-of-life Microsoft Operating Systems—including Windows and MS-DOS—have allegedly been made public through a compilation of torrent files. In this post, we'll look at the impact this may have on the current state of Window's security, what you need to know, how you may be affected, and what you can do about it.
Building Breach Resiliency Through Collaboration
Breach resiliency is centered around building processes to aggregate and action information quickly based on what systems, technologies, etc. you have in your environment. To be effectively resilient to a breach, you must collaboratively build a thorough understanding of your environment, your workflows, your processes, and, last but certainly not least, your specific threats.
PCI DSS - What it is and what it isn't
PCI is not easy. PCI is not a guarantee that you won’t be breached. And lastly, PCI is not optional if you store, process, or transmit payment card data.
Stay Steps Ahead With Assumed Breach Testing
The word 'assume' tends to have a bad reputation. After all, we’re taught from a young age what happens when you 'assume'; however, when it comes to security testing, the ‘Assumed Breach’ approach can be a great way to help your organization gain insight that further improves your defenses.
To SAST, or to DAST, That is the Question
New vulnerabilities are discovered, exploited, and then featured in the news on a daily-basis. Now, more than ever, securing our web applications, and the ways we develop them, is paramount.
Deconstructing The Pen Test
Penetration tests are an invaluable tool for organizations. However, they’re often confused, misused, and mean different things to different people.
Does Your Office Miss You?
Who's watching your office while everyone is working from home?
The Great Security Race
When it comes time to present assessment results, I’m often asked to benchmark the company being assessed against similar organizations. As someone who has built a career around assessing information security programs, I always find myself asking the same question: what’s the purpose of such a request?