Keeping Assets Secured In the Entertainment Business

securing entertainment industry

In our previous post, we looked at some of the major hacks that struck the entertainment industry and identified the industry’s reliance on third-party providers as a major vulnerability. Today, we’ll look at the steps the entertainment industry needs to take to protect assets from potential threats. As always, the industry needs to balance security […]

A Breath Of Fresh Air For A Busy CISO

CISOs-under-control

We’ve all been there. As Chief Information Security Officer (CISO), your team, your management, and your board are all clamoring for your time. Not to mention the dozens of items calling you from your inbox and notification dashboards that all are demanding your immediate attention. The threat landscape is rapidly changing, with warnings being issued […]

Ran Shahor: The Greatest Cybersecurity Threat is Not What You Expect

cybersecurity missing piece

The world of cybersecurity is facing perhaps one of the biggest challenges it has ever encountered. I’m not talking this time about ransomware, Log4J, phishing, or any other attack, but a crisis of PEOPLE. For decades, I have been speaking about the need for training and cultivation of cybersecurity experts; so much so that I […]

Entertainment & Media – The Next Big Cyber Attack Target?

entertainment & media cyber attack

On November 24, 2014, Sony Pictures employees discovered that the company’s network had been hacked. Attackers stole terabytes of data, deleted the originals off computers, and threatened to release the information they stole. Over the next few months, the hackers posted four previously unreleased films and thousands of documents onto the public web. Internet users […]

The nation-state cyberattack playbook – what comes next?

nation-state playbook

With clashes expanding between Russia and Ukraine, questions are raised as to how far a battle like this can go. In the past warfare used to exclusively mean “boots on the ground”, but today there is a different type of battleground to be fought as well, the battle taking place every hour, of any day […]

Why You Should Care About the Iran Cyber Attack Landscape

Iranian Cyber Attack

Over the last decade, Iran has waged several destructive cyber attacks against governments and private companies, becoming infamous for its deployment of wiper malware as well as its retaliatory attack strategies. As of the end of 2021, in addition to launching attacks on governments and nation-state resources, Iran has been increasing its focus on attacking […]

Assessing Cyber Readiness for 2022

assessing cyber readiness

Assessing your cyber readiness every year is vital to ensuring that your network, applications, and systems have the appropriate protections in place. As we flip the calendar ahead into 2022, performing your cyber assessments is a great way to ring in the new year, along with dropping 15 pounds, hitting the gym 3 times a […]

The Impact of Russian Aggression on Cybersecurity

Russia Attack

With the situation escalating to an invasion, we have already seen these troop movements and aerial bombardments accompanied by cyber attacks on banks and TV stations in Ukraine. For those in the West, the Russian cyber threat is elevated but will be driven largely by the severity of sanctions placed on Russia, as well as […]

China Cyber Threat Defense – Today and in the Months Ahead

china cybersecurity

In 2021, the White House Briefing Room issued a statement attributing malicious cyber activity and threats to the People’s Republic of China. In the statement, China was accused of using “criminal contract hackers to conduct unsanctioned cyber operations globally.” The activities of these Chinese hackers include ransomware attacks, cyber-enabled extortion, crypto-jacking, and theft. One of […]

Everything You Need to Know About Apache Log4J

log4j vulnerability

Update 14th January While the Log4j shell vulnerability surfaced a month ago, it is still being exploited in the wild. Attackers are utilizing it to gain remote code execution (RCE), enabling the deployment of ransomware, crypto miners, and the access of unauthorized systems and data. Exploitation remains simple, allowing attackers to get full control without […]