Think You Know Cybersecurity? These Numbers Might SHOCK You!
In an era dominated by digital advancements, cybersecurity emerges as a pivotal concern across various critical sectors. Each faces unique threats that not only compromise sensitive information but also incur substantial financial costs. Between March 2023 – May 2023, an average of 11.5 attacks occurred every minute, including 1.7 novel malware samples every minute. This […]
Read MoreCybersecurity is More Difficult Than Ever With Less People Than Ever. Have You Considered this Shocking Fact?
In today’s digital-first world, the cybersecurity landscape is evolving with alarming velocity, introducing new challenges and complexities at every turn. This rapid evolution has not only intensified the demands placed on cybersecurity professionals but has also highlighted a significant and growing gap in the workforce skilled enough to navigate these treacherous waters. Unfortunately, broadcasting the […]
Read MoreCyber Compromise in the Koreas? What Do Geopolitics Have to Do With My Cybersecurity?
The Macro Implications One of the many ways to parse the news regarding the compromise of South Korea’s chip manufacturers by nation-state actors is to look at the downstream risks to US entities, both in the public and private sectors due to our highly integrated supply chains. While US entities may not directly “consume” the […]
Read MoreCould a Cybersecurity Policy Have Prevented Your Last Security Breach?
A Vulnerable Target: Small Businesses in the Cyber Arena 36% of all cyberattacks in 2023 were specifically aimed at small businesses. This figure not only highlights the growing threat landscape but also underscores the critical need for these businesses to bolster their cybersecurity defenses. Small businesses often underestimate the sophistication of cyber threats, making them […]
Read MoreIs Your Business Ignoring Cybersecurity? The Risk You’re Taking Might Shock You
A recent study by Delinea has uncovered a concerning trend: over 50% of IT security decision-makers sideline cybersecurity, treating it primarily as a compliance checkbox rather than a cornerstone of business success. This insight, drawn from a survey of 2,000 professionals, highlights a critical misalignment between cybersecurity efforts and overall business objectives. Such an oversight […]
Read MoreMicrosoft was compromised. Are you next?
In a recent and unsettling turn of events, Microsoft fell victim to a cyber attack that sentshockwaves across the globe. NOBELIUM, also known as “Midnight Blizzard,” is a Russianstate-sponsored group and was found to be responsible for this calculated attack. Forcountless individuals and businesses relying on Microsoft’s vast array of services, thisincident is more than […]
Read MoreDemystifying Cal-Secure – Part 2
In Part 1 of the Demystifying Cal-Secure series, we understood when Cal-Secure is needed, who it applies to and so on. Now let us move to what it entails: Cal-Secure covers the people, processes, and technology that must be addressed by the executive branch. Cal-Secure is designed to be utilized by state government agencies and […]
Read MoreZero Trust Architecture in Operational Technology Environments
Many large enterprise organizations are adopting the Zero Trust Security Model for their network architectures. The Zero Trust Model is a concept that suggests organizations should not automatically trust anything inside or outside their network perimeters. There is no single set of controls that will achieve Zero Trust. However, as described by the model, there […]
Read MoreWhat is XSS (Cross-Site Scripting)?
In the world of websites, scripts play an essential role in defining the behaviours of websites and web applications. Although scripts are invisible to viewers, they handle things such as the video player on YouTube, what happens when you click the hamburger icon, what happens when you enter your contact information or credit card information, […]
Read More