Matt Pascucci

Legally Dangerous Attackers

Malicious actors are consistently and persistently looking for new avenues to compromise sensitive data and they’ve found one such entry through legal firms. Legal firms play a unique role within the economy by being at the center of personal and business-related transactions. Legal firms are involved with large enterprises, governments, ... Read More
Matthew Pascucci

Podcast: CISO Speak – Vulnerability Management in the Cloud

The post Podcast: CISO Speak – Vulnerability Management in the Cloud appeared first on CCSI ... Read More
Matt Pascucci

So You want to Work in Cybersecurity, eh?!

There is a massive need for cybersecurity professionals today and the need is only growing. We’ve seen estimates of anywhere between 2-3 million vacant jobs over the next three years. The demand is definitely bullish and showing no signs of stopping. With this being said, breaking into an industry is ... Read More
What You Should Know About Driving Down MTTD and MTTR

What You Should Know About Driving Down MTTD and MTTR

Effectively connect people, process and technology to minimize MTTD and MTTR There’s a reason it’s said that what gets measured gets managed. In order to successfully achieve a goal, you have to be able to measure progress. It’s the only way to know if you’re heading in the right direction ... Read More
Matthew Pascucci

Why a Zero-trust Network with Authentication is Essential

Zero-trust networks are often deemed compromised and untrusted, making authentication variables essential to security. Expert Matthew Pascucci explains a zero-trust security model. In the past, we’ve done a great job of making networks accessible. But with this increased availability, we’ve opened the door for attackers to move more easily around ... Read More
CISO Roundtable

First Annual Long Island CISO Roundtable

Two weeks ago CCSI held its first annual CISO Roundtable to discuss cybersecurity trends, issues and solutions. The conversation was focused on how local CISO’s are currently handling security from an executive level. In attendance were ten cybersecurity leaders on Long Island who brought years of experience and expertise to ... Read More

LDAP injection: How can it be exploited in an attack?

Joomla is a popular content management system that accounts for almost 3% of all websites on the internet, and it has been downloaded over 84 million times. A static analysis organization called Rips Technologies recently found it to be vulnerable to an LDAP injection vulnerability. This vulnerability was in the ... Read More

BlueBorne vulnerabilities: Are your Bluetooth devices safe?

Last month, a series of Bluetooth vulnerabilities was discovered by research firm Armis Inc. that enables remote connection to a device without the affected users noticing.The vulnerabilities were reported on Android, Linux, Windows and iOS devices. These vendors were all contacted to create patches for the BlueBorne vulnerabilities and worked ... Read More

How can Windows digital signature check be defeated?

Recently, it was determined by a SpecterOps researcher, Matt Graeber, that there is a way to bypass a Windows digital signature check by editing two specific registry keys. This is an important discovery because Windows uses digital signature protection to validate the authenticity of binary files as a security measure.Digital ... Read More

Active Cyber Defense Certainty Act: Should we ‘hack back’?

Recently, a bill was proposed by Georgia Congressman Tom Graves named the Active Cyber Defense Certainty Act, which has now gone on to be called the hack back bill by individuals in the cyber community. This bill is being touted as a cyberdefense act that will enable those who have ... Read More
Loading...