The Solarwinds Attack – Don’t Trust; Always Verify

The Solarwinds Attack – Don’t Trust; Always Verify

What’s the biggest lesson from the SolarWinds fiasco? That just focusing security defenses on the most common means of penetrating an organization doesn’t cut it. Sure, you should guard against phishing, fortify your DMZ and Internet-facing applications,...
Acalvio ShadowPlex for MITRE Shield

Acalvio ShadowPlex for MITRE Shield

MITRE recently announced the first release of Shield MITRE recently announced the first release of Shield (https://shield.mitre.org/), an active defense knowledgebase on how to defend and engage with adversaries. The knowledgebase is a significant endorsement to Cyber...
Fact: Latest Ransomware Can Bypass AV/EPP/EDR Solutions

Fact: Latest Ransomware Can Bypass AV/EPP/EDR Solutions

Ransomware attacks have become an easy approach for cybercriminals Ransomware attacks have become an easy approach for cybercriminals to target businesses of all sizes – transcending industry types and geographies. There has been a marked transition in ransomware...
The Wide-Ranging Implications of the CCPA-11.20.2019

The Wide-Ranging Implications of the CCPA-11.20.2019

The California Consumer Privacy Act, or CCPA, goes into effect on Jan. 1, 2020. Most mid-sized companies still have no clue about this data privacy legislation or how it will impact their business operations. We’ll dig into this topic a bit, but recognize that we are...
Hacking Back With The Active Cyber Defense Certainty Act

Hacking Back With The Active Cyber Defense Certainty Act

H.R. 3270 …also known as the Active Cyber Defense Certainty Act (ACDC), will, if it becomes law, allow victims of hacking to execute self-defense outside of their networks. The essence of this bill was originally introduced in 2017 as H.R. 4036, which...