Why Causal AI is Crucial to Cyber Defense Planning in 2023
Recently, there’s been tremendous hype around artificial intelligence. For cybersecurity practitioners, it’s becoming increasingly important in developing a cybersecurity strategy. AI’s ability to scan millions of events in seconds while identifying anomalies and suspicious patterns is far superior to rule-based scans. It has applications in endpoint protection, securing IoT devices, ... Read More
Prioritize Cyber Risk With Business Impact Analysis
As an industry, cybersecurity companies often talk about risk. However, we rarely take the time to explain what risk is or how it impacts organizations. It’s important to understand that risk is measured based on the negative impact it can have on the enterprise’s mission. Let’s look at a basic ... Read More
Why aren’t CISOs satisfied with their cyber defense plans?
The relentless pace of cyberattacks in 2022 showed no signs of slowing down, leaving security leaders challenged to defend against an array of sophisticated threats in 2023. With global political instability and the quick payday available to cyber criminals, nation-state-grade attacks are the biggest concern. Our data indicates that Ransomware ... Read More

Keeping Assets Secured In the Entertainment Business
In our previous post, we looked at some of the major hacks that struck the entertainment industry and identified the industry’s reliance on third-party providers as a major vulnerability. Today, we’ll look at the steps the entertainment industry needs to take to protect assets from potential threats. As always, the ... Read More
5 Core Elements of an Effective Cybersecurity Strategy for CISOs
There is no “one size fits all” when it comes to cybersecurity. Over the last six months, we have seen an escalation in the number of reported cyberattacks, in their range, sophistication and in their long-lasting impact on businesses such as the Colonial Pipeline attack, and SolarWinds to name just ... Read More
The 20-Year Evolution of Nation-State Grade Cyber Attacks and Its Impact on Enterprises Today
Gone are the days where nation-state-grade cyberattacks were the exclusive activity of state actors against state targets. Today, the situation has shifted. Nation-state-grade cyberattacks are still dominated by state actors, but increasingly, non-state attackers purchasing nation-state-grade cyberattack tools on the Darknet, are also leading cyberattacks against private enterprises and even ... Read More
Why Should Nation-State Grade Attacks Be The Focal Point of Your Cybersecurity Strategy?
Anatomy of a nation-state grade attack The 2020 Solar Winds attack, believed to have been launched by Russia’s Cozy Bear (AKA APT29), a Russian hacker group reputedly associated with Russian agencies such as FSB and/or SVR, was a nation-state grade attack. It stealthily “trojanized” an update of SolarWinds’ Orion, an ... Read More
Recent Nation-State Grade Attacks Are a Wake-Up Call for Many Organizations to Improve Cyber Defenses
The Awakening and What’s Behind President Joe Biden’s Executive Order on Cybersecurity There has never been a more opportune time to implement a pro-active cyber-defense strategy against Nation-State grade level threats for both the public and the private sectors in the US. The recent wave of cyber-offenses on government entities, ... Read More
What are the keys to a successful cybersecurity strategy? Our CEO Ran Shahor Explains All
According to Ran Shahor, CEO and co-founder of HolistiCyber, a successful cybersecurity strategy should start with a detailed plan. This should place your business requirements, budget, and security posture at the forefront of any other decisions you make to keep your company assets and data secured. How do you build ... Read More
Russian Cyber Threat Defense – Now and Looking Forward
Despite the perceived breakneck pace of change since the start of the pandemic, many aspects of life remained the same. In 2017 a US Director of Intelligence paper explained how software supply chain attacks “circumvent traditional cyber defenses to compromise software to enable successful, rewarding, and stealthy methods to subvert large numbers ... Read More