Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Deep Dive into the History of Cyber Security Awareness Month

Happy Cybersecurity Awareness Month! Since 2004, the United States has recognized October as Cybersecurity Awareness Month. The president at the time, George Bush, alongside the United States Congress, declared October as the month to dedicate to cybersecurity and raise awareness about the importance of protecting sensitive information in the following sectors: Each of these sectors plays a significant role in shaping society's social, economic, and political landscape in the past, future, and present.

Key Takeaways from the 2023 Domain Impersonation Report

One of the most pervasive and unavoidable threats on the internet, domain impersonation can be used by bad actors as the basis for a wide range of attacks. The various ways in which cybercriminals make use of lookalike domains often fluctuate, and the first half of 2023 has exemplified this fact. Staying on top of security and not falling victim to these attacks requires knowing what the dangers are and keeping track of the threats that are likely to spring up.

What is NERC? Everything you need to know

Electric grids are part of every nation’s critical infrastructure. Every societal activity and business depends on reliable and safe electricity distribution. The US electric grid is a huge network of powerlines, distribution hubs, and renewable and non-renewable energy generators that is increasingly exposed to cyber-physical risks due to the accelerated reliance on cyber-enabled systems and IoT-connected devices, such as smart meters.

The Importance of Email Archiving

One of the primary reasons for email archiving is legal compliance. Many industries and organizations are subject to various regulations and laws that require them to retain certain types of electronic communication, including emails. Failing to comply with these regulations can result in severe penalties, fines, and legal consequences. By implementing email archiving, you ensure that your organization is well-prepared to meet these requirements. Litigation Support.

10 Methods for Identifying and Protecting Privileged AD Users

Compromising privileged accounts is the penultimate objective of most cyberattacks — once attackers gain privileged access, they can then accomplish their final goal, whether that’s to steal or encrypt information assets or disrupt business operations. Typically, cybercriminals gain a foothold in a network by compromising of a low-level account on a local machine.

The US Threat Landscape in 2023

The United States is at the epicenter of cyber crime globally. It is by far the most highly-targeted nation, and American businesses face a higher volume of attacks as well as more costly consequences when an attack is successful. In this webinar, Cyberint Threat Research Team Lead Shmuel Gihon will discuss the current US threat landscape, recent trends, and the most urgent risks to prepare for. Using research and data collected by the Cyberint research team.

SEC Regulations: What is a "Material" Cybersecurity Incident?

In one of the most important cybersecurity regulatory developments in recent memory, the U.S. Securities and Exchange Commission (SEC) recently adopted new cybersecurity disclosure requirements for publicly traded companies, including a requirement to publicly disclose a “material” cybersecurity incident in Form 8-K within four business days of determining that it is material.