Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Nearly One-Quarter of Financial-Themed Spam Emails are Phishing Attacks

While spam tends to be dismissed as being more an annoyance, new research shows that there is a very real and ever-present threat in emails that are marked as “spam”. I’ve written plenty about phishing attacks that target bank customers. It’s nothing new. What’s interesting is a recent article by security researchers at BitDefender where banking-related phishing attacks are considered spam.

The Importance Of Firewall Penetration Testing In Your Security Strategy

Firewall Penetration Testing is an essential part of any security strategy. It tests the effectiveness of firewalls and other network security measures by attempting to breach them, exposing vulnerabilities before attackers can exploit them. By conducting regular firewall penetration tests, organisations can protect their networks from malicious actors trying to gain access or disrupt operations.

Safeguarding K-12 Education: A Whole-of-State Approach to Cybersecurity for Chromebook-Centric School Districts

In today’s rapidly evolving digital landscape, K-12 school districts are harnessing the power of technology to transform education. The widespread adoption of Chromebooks has revolutionized the learning process, providing students with tools for collaboration, research and creativity. However, along with these advancements come unprecedented cybersecurity challenges that demand a comprehensive strategy.

The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 2

In the first part of this series, we provided a brief overview of the Windows Restart Manager. In this blog post, we examine how these mechanisms can be exploited by adversaries and review how the CrowdStrike Falcon platform can detect and prevent these attacks.

What You Need to Know About Security Compliance Management

Security compliance management is that set of policies, procedures, and other internal controls that an organization uses to fulfill its regulatory requirements for data privacy and protection. Put another way, security compliance management is a subset of regulatory compliance management that specifically addresses data protection. Clearly security compliance management is important.

The Statistical Analysis of Measuring Cybersecurity Risk

Businesses are more at risk of cyber attacks than ever before. Calculating that risk, however, can be a challenging task. In this post we will provide an overview of traditional calculation methods and explore the future of measuring cybersecurity risk: statistical analysis. The cost of a cyberattack can be painfully high, sometimes high enough to shut down business operations entirely.

Medical Food Company Mom's Meals Suffers Serious Data Breach Exposing More than 1M

Mom's Meals is a food service company that helps provide meals to people who are in need of help. This meal service organization works to deliver food to the homes of individuals who need help with food. These individuals could be at risk for identity theft and other serious problems in the future. Learn about the specifics of this breach below and understand the full risk for data loss because of the attack.

Weekly Cybersecurity Recap September 1

Data breaches are becoming more and more of a problem worldwide, and this week, it's especially obvious that they're causing trouble for serious companies. Major medical organizations, schools, and financial companies were all hit by breaches this week. Mom's Meals, Blue Cross Blue Shield of Illinois, and Prospect Medical Holdings are all medical companies impacted by breaches this week. TMX Finance and the University of Minnesota are the other targets we cover in the recap below.