Best Practices
It’s Time to Revive your Enterprise Business Resiliency Plan
The COVID-19 pandemic has permanently changed normal business operations. Globally, companies are investing more heavily in digital transformation in order to adapt to current regulations. Additionally, digital transformation can drive down an ...
Game Hacking Part 1 – Equipping Your Loadout
Why Bother with Video Game Security? Video games are more than just entertainment. Gaming is a massive industry which by some accounts is estimated to be worth $256.97 billion by 2025. So ...
Too much information?
An interesting piece in the Harvard Business Review highlights the one of the challenges information security professionals face when dealing with security awareness; we actively ...
It could happen to anyone…
The headline is eye catching: a data breach at a highly respected security training organization when an employee falls for a phishing email. It is ...
How Are You Keeping Up with NIST 800-53 Revisions?
The National Institute of Standards and Technology Special Publication 800-53, or simply NIST SP 800-53, is the go-to guideline set in place to help both contractors and federal agencies alike meet the ...
The Escalating Demand for Continuous Monitoring in Healthcare
As the technology we use to conduct business continues to advance, so too does the frequency and sophistication of attacks on our configuration management systems. The threat landscape is changing, and throughout ...
How to Maximize Your SOAR Investment
The Problem Today’s security analysts face serious challenges when attempting to identify, assess, respond to and remediate alerts in a timely manner. What's more, as new internet of things (IoT) devices are ...
How to Maximize Your SOAR Investment
The Problem Today’s security analysts face serious challenges when attempting to identify, assess, respond to and remediate alerts in a timely manner. What's more, as new internet of things (IoT) devices are ...
Hashing Functions – CISSP Domain 3
Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP common body of knowledge (CBK). There is often some confusion between hashing, encryption, ...
Skimmers in Images & GitHub Repos
MalwareBytes recently shared some information about web skimmers that store malicious code inside real .ico files. During a routine investigation, we detected a similar issue. Instead of targeting .ico files, however, attackers ...
