Podcast: OT Security

Zero Trust for ICS/SCADA Systems

Society today is heavily dependent on critical infrastructure that mostly works behind the scenes such as power stations, oil refineries, agriculture operations, mining, water treatment, green energy, transportation, and manufacturing operations. These systems help deliver electricity to power our homes, recharge our phones and vehicles, deliver goods using just-in-time (JIT) ... Read More
How Secure are your Endpoints | Protect Windows Machines

Give Your Cyber Security Career a Boost

While the shortage of qualified cyber security professionals continues to grow exponentially and ransomware attacks grab international headlines, many mid-career IT professionals with cyber security job experience are evaluating their options. Maybe a year of working remotely has given you pause to think about your career goals and take some ... Read More

Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person

It is that time of the year again—hacker summer camp is back! In 2020, the global pandemic dramatically changed our social environment, and both Black Hat and Defcon went virtual with in-person networking and parties placed on hold. This year, both events are back with a hybrid flavor to them ... Read More
Remote workers face frustration with Internet connections and software issues

Cyber Security Wakeup Call: New Global Research Shows Remote Workers Face Tough Choices Between Productivity and Security

ThycoticCentrify just completed a global cyber security survey among 8,000+ knowledge workers in 15 countries in partnership with Sapio Research. Survey results reveal a disturbing (if not surprising) disconnect between an understanding of cyber security risks in 2021 and the risky activities employees engage in every day to get their ... Read More
2021 Verizon DBIR Breaches 2020 vs 2021

3 Top Takeaways from the 2021 Verizon Data Breach Investigations Report

The 2021 Verizon Data Breach Investigations Report (DBIR) is here with the latest news and trends on the past year’s data breaches and security incidents. The Verizon DBIR is one of the industry’s top reports providing us with an indication of how well, or how poorly, our security efforts are ... Read More

Layered Privilege Security with Secret Server and Privilege Manager

Nearly all major data breaches involve both compromised endpoints and compromised privileged credentials. You must address both of these attack vectors in a layered security strategy to effectively lower your risk of a cyber attack. Layered security combines different security solutions into a coordinated, comprehensive strategy, the whole of which ... Read More

Cyber Incident Response Checklist and Plan: Are You Breach-Ready?

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation-states, and almost always comes from beyond our own country’s borders and laws. Because of this, we ... Read More
2021_US21_SB-3256_11_The-Real-World-Story-of-a-Ransomware-Attack

New Ransomware Model Presumes Honor Among Thieves

Ransomware is now big business, part of a production line of organized cyber crime. Thanks to ransomware’s new “affiliate” model, not only are attacks increasing in frequency, but they’re also becoming more sophisticated, successful, and damaging. This new affiliate model is also known as Ransomware-as-a-Service Ransomware attacks have victimized multiple ... Read More
Cyber Security Incident Report Template Search Trend

Cyber Security Incident Reporting Process and Template

Ever since we launched our customizable cyber security incident report template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware, and ransomware being taken seriously by organizations large and small, and that there is a growing demand for guidance ... Read More
The New Cyber Security “Perimeter”: Securing Privileged Access

The New Cyber Security “Perimeter”: Securing Privileged Access

Because so many applications and services are now hosted in the cloud, the traditional cyber security perimeter no longer exists. Accelerated by the COVID global pandemic, remote access from multiple devices has become the rule rather than the exception across our networks. In our always-on, Internet-connected universe, every user potentially ... Read More