cyber attack
Attackers Evolve Tactics to Infiltrate Your Network via Email
3 min read
Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]
Don’t Risk IT: Cybersecurity Risk Driving IT Modernization
1 min read
Many federal, state, and local government agencies are operating old, outdated and end-of-life network equipment. You may think this just means slower, less efficient operation – not worth the cost to refresh your infrastructure, right? Wrong. Outdated network equipment is actually a major cybersecurity risk, particularly for government agencies, as it makes networks more susceptible […]
Security Steps to Take in the Holiday Season – and Beyond
2 min read
Retail companies face a landscape filled with growing and increasingly complex threats. And the financial impact of these breaches is soaring. There are obvious financial incentives for attacking retailers because they typically don’t spend as much on security as financial institutions or government organizations, so they’ve become easy targets in recent years. According to Gartner, […]
The Rise in Healthcare Cybercrime
3 min read
January this year witnessed the largest healthcare breach to date in which the personal records of 80 million individuals were compromised. It also marked an apparent change in focus from attacks on delivery organizations to healthcare payers. Last week two additional health insurers reported that they too had been hacked, resulting in the possible compromise […]
#CiscoChampion Radio S2|Ep 14. Threat Grid
1 min read
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’ll be talking about Threat Grid with Cisco Business Development Manager and Threat Grid expert, Jessica Bair. Listen to the Podcast. Learn about the Cisco Champions Program HERE. See a list of all #CiscoChampion Radio podcasts HERE. Ask about the next round of […]
Cisco Cloud Security Architecture: Un-Cloaking Invisible Threats
4 min read
In the more than ten years, I have worked in developing security solutions, I have witnessed the steady evolution of security threats and the incredible strides made to combat them. Recent high profile security breaches have shown that a breach in security can have serious consequences.. It can lead to loss or destruction of business […]
Mobility, Security and the Pressure In-Between
2 min read
From checking bank statements to booking flights, mobile phones have become integral to our everyday lives. In the near future, the number of mobile devices will exceed the world’s population,...
Cyber Threat Management from the Boardroom Risk: Lost in Translation
5 min read
I was at the Gartner Security and Risk Management Summit at the Gaylord National Harbor and had the opportunity to attend the session, “Finding the Sweet Spot to Balance Cyber Risk,” which Tammie Leith was facilitating. During the session, the panel had been discussing how the senior leadership teams address the problem of putting their […]
Cupcakes and Cyber Espionage
5 min read
This blog will suggest a change of strategy in how we address the threat of cyber espionage. One which leverages traditional tactics of counter-intelligence and uses a new approach different than the Lockheed Martin Cyber Kill Chain approach to security, which seeks to disrupt the chain of attack as quickly as possible. Rather than simply […]
1