A Perfect Cybersecurity Storm is Brewing

cybersecurity storm

There’s a storm brewing in cybersecurity that may reshape the priorities of the entire industry over the next couple of years. Four macro-trends coming together at the same time: 1) Use of ๐˜€๐˜๐—ผ๐—น๐—ฒ๐—ป ๐—ฐ๐—ฟ๐—ฒ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฝ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด now represents the most commonly used attack vectors in successful breaches. 2) ๐—ฅ๐—ฒ๐—ฐ๐—ฒ๐˜€๐˜€๐—ถ๐—ผ๐—ป is looming if not already upon […]

Keeping Assets Secured In the Entertainment Business

securing entertainment industry

In our previous post, we looked at some of the major hacks that struck the entertainment industry and identified the industryโ€™s reliance on third-party providers as a major vulnerability. Today, weโ€™ll look at the steps the entertainment industry needs to take to protect assets from potential threats. As always, the industry needs to balance security […]

A Breath Of Fresh Air For A Busy CISO


Weโ€™ve all been there. As Chief Information Security Officer (CISO), your team, your management, and your board are all clamoring for your time. Not to mention the dozens of items calling you from your inbox and notification dashboards that all are demanding your immediate attention. The threat landscape is rapidly changing, with warnings being issued […]

Ran Shahor: The Greatest Cybersecurity Threat is Not What You Expect

cybersecurity missing piece

The world of cybersecurity is facing perhaps one of the biggest challenges it has ever encountered. I’m not talking this time about ransomware, Log4J, phishing, or any other attack, but a crisis of PEOPLE. For decades, I have been speaking about the need for training and cultivation of cybersecurity experts; so much so that I […]

Entertainment & Media – The Next Big Cyber Attack Target?

entertainment & media cyber attack

On November 24, 2014, Sony Pictures employees discovered that the companyโ€™s network had been hacked. Attackers stole terabytes of data, deleted the originals off computers, and threatened to release the information they stole. Over the next few months, the hackers posted four previously unreleased films and thousands of documents onto the public web. Internet users […]

The nation-state cyberattack playbook โ€“ what comes next?

nation-state playbook

With clashes expanding between Russia and Ukraine, questions are raised as to how far a battle like this can go. In the past warfare used to exclusively mean โ€œboots on the groundโ€, but today there is a different type of battleground to be fought as well, the battle taking place every hour, of any day […]

Why You Should Care About the Iran Cyber Attack Landscape

Iranian Cyber Attack

Over the last decade, Iran has waged several destructive cyber attacks against governments and private companies, becoming infamous for its deployment of wiper malware as well as its retaliatory attack strategies. As of the end of 2021, in addition to launching attacks on governments and nation-state resources, Iran has been increasing its focus on attacking […]

Assessing Cyber Readiness for 2022

assessing cyber readiness

Assessing your cyber readiness every year is vital to ensuring that your network, applications, and systems have the appropriate protections in place. As we flip the calendar ahead into 2022, performing your cyber assessments is a great way to ring in the new year, along with dropping 15 pounds, hitting the gym 3 times a […]

The Impact of Russian Aggression on Cybersecurity

Russia Attack

With the situation escalating to an invasion, we have already seen these troop movements and aerial bombardments accompanied by cyber attacks on banks and TV stations in Ukraine. For those in the West, the Russian cyber threat is elevated but will be driven largely by the severity of sanctions placed on Russia, as well as […]