speak to an expert

Blowing the Whistle For Cybersecurity Compliance

Early in July, Aerojet Rocketdyne agreed to a $9M settlement in a whistleblower lawsuit. The aerospace and defense company was sued on behalf of the state of California by Brian Markus, a ...
speak to an expert

The Executive Board and the Virtual CISO

Cybersecurity fears are escalating. Cybercrime in the post-pandemic world has skyrocketed, and nation-state grade threats sit on every organization’s doorstep. Four out of five organizations report an increase in cyber threats since ...
Ten common causes of downtime and how to avoid them (Google Cloud Next '17)

Understanding user intent – the panacea for mission-critical application QoE issues

In this blog post, we would like to continue our discussion about the panacea for mission-critical application QoE issues. Since analogies from the actual world of traffic to the world of IT ...
CIS Controls implementatin groups

Center for Internet Security (CIS) Controls v8: Your Complete Guide to the Top 18

The Center for Internet Security (CIS) controls are a relatively short list of high-priority, highly effective defensive actions that provide a “must-do, do-first” starting point for every enterprise seeking to improve its ...
speak to an expert

Overcoming the People Shortage

Earlier this year, HolistiCyber’s CEO, Ran Shahor, shared his thoughts on the biggest cybersecurity threat. It’s not the Russians or Chinese; it isn’t even supply chain attacks. While those are serious threats ...
speak to an expert

Keeping Assets Secured In the Entertainment Business

In our previous post, we looked at some of the major hacks that struck the entertainment industry and identified the industry’s reliance on third-party providers as a major vulnerability. Today, we’ll look ...
How to protect against the weakest link in cybersecurity – THE USERS

How to protect against the weakest link in cybersecurity – THE USERS

Cyberattacks continue to grow year over year. An astounding 5,126,930,507 breached records in 2021 represent an 11% increase in security incidents compared to 2020, based on IT governance analysis. Security professionals are ...
ran shahor

Ran Shahor: The Greatest Cybersecurity Threat is Not What You Expect

The world of cybersecurity is facing perhaps one of the biggest challenges it has ever encountered. I’m not talking this time about ransomware, Log4J, phishing, or any other attack, but a crisis ...
New call-to-action

Why You Should Care About the Iran Cyber Attack Landscape

Over the last decade, Iran has waged several destructive cyber attacks against governments and private companies, becoming infamous for its deployment of wiper malware as well as its retaliatory attack strategies. As ...
Why DDoS is still a major attack vector and how to protect against it

Why DDoS is still a major attack vector and how to protect against it

The first massive, documented DoS-style attack occurred during the week of February 7, 2000, when “mafiaboy,” a 15-year-old Canadian hacker, orchestrated a series of DoS attacks against several e-commerce sites, including Amazon ...