Generative AI: threat or opportunity? It depends on your adaptive speed!

Now that AI reasoning capabilities are blasting and becoming accessible, folks tend to argue that generative AI will bring us a new era of exploitation. More zero days, more vulnerabilities, more sophisticated, and in higher frequency. The emergence of more new exploitation techniques will significantly increase the number of new vulnerabilities. We have seen in […]
Winds of Change

FFIEC announced that it will sunset the CAT on August 31, 2025, meaning the tool will be removed from its website and no longer supported after that date. Though FFIEC had never required to use the CAT as a mandatory cybersecurity assessment tool, eventually most of the institutions had chosen voluntarily to use CAT because […]
Budget Approved: 13 Cybersecurity KPIs That CISOs Can Present to the Board

When reporting to the board, a CISO must translate risk into identifiable terms to present key findings and ensure that all cybersecurity initiatives are aligned with business objectives. Cyber risk mitigation expenditures help translate risk into potential additional profit. Although CISOs and board directors should be aligned, they are oftentimes cosmic universes apart. One reason […]
Understanding the Need for A Risk Register in Cybersecurity

Risk registers are a vital tool for cybersecurity planning that consolidate business risks into a single, manageable space. They provide streamlined reporting and information to align teams around the most important initiatives and will help save resources, time, and labor. By integrating compliance standards, defining the boundaries of needed coverage, and the likely effectiveness of […]
An Olympic Size Cybersecurity Threat

The Paris Olympics will captivate global attention for several weeks this summer. As the world’s top athletes gather to showcase their skills, cybercriminals are gearing up to capture valuable digital prizes as well. Just like synchronized swimmers work together to create a flawless performance, your organization’s cybersecurity efforts require coordination, precision, and seamless teamwork. Major […]
What CISOs Need To Know About The Lockbit Takedown

In a sweeping international operation, law enforcement agencies, spearheaded by the UK’s National Crime Agency, the U.S. Federal Bureau of Investigation, and Europol, have dealt a powerful blow to the notorious “LockBit” ransomware gang. The joint effort, known as ‘Operation Cronos,’ has disrupted the criminal infrastructure of LockBit, a cyber threat group responsible for over […]
Navigating The Cyber Challenges of 2024

By Ran Shahor, CEO and Holistic Cyber Co-Founder. As we begin what I know will be a year of tremendous growth and change for us at Holistic Cyber, now is an opportune moment for me to reflect on the challenges and triumphs that shaped our past year as leaders in cyber security, and to make […]
Cyber Defense Planning and Optimization: Revolutionizing the Industry

Heads-up CISOs – there’s a major paradigm shift coming that will change how you plan and execute your adaptive cybersecurity defense strategy. There’s a new term that you are going to be hearing a lot in the coming months that will become a standard phrase in the cybersecurity community. One that will change how you […]
Enabling CISOs to Meet The Challenge of Cyber Security Planning

By Ronen Lago As cybersecurity experts dedicated to analyzing and researching the latest threats, we at Holistic Cyber welcome initiatives like the U.S. government’s National Cybersecurity Strategy. The strategy, released publicly in March of this year, is a comprehensive plan that outlines the nation’s approach to addressing cybersecurity challenges and protecting its critical and digital […]
Does Pentesting Save You Money On Cyber Insurance Premiums?

Way back in the cyber dark ages of the early 1990s as many households were buying their first candy-colored Macintoshes and using them to play Oregon Trail and visit AOL chat rooms, many businesses started venturing into the digital realm as well by giving employees access to the new digital tools like email, ftp file […]