The State of the Nation: Incident Report in the U.K.

uk data breach report

“Phishing incidents are up 56% between 2019 and 2020, and hardware/software misconfigurations are up 44%.” We are all familiar with the Verizon Data Breach Report: it’s a guidebook on where the cyber world is with incidents globally. While this is an invaluable asset to the industry each part of the world has their own nuances […]

Defend Like an Attacker: 4 Required Approaches

hand on a laptop

Brig. General Ran ShahorCEO and Co-Founder, HolistiCyber Our CEO and Co-Founder, Brigadier General (Ret.) Ran Shahor  (pictured on the left) was recently featured in Security Magazine relaying his extensive knowledge around nation-state attackers and how to defend against them. Despite the cliché “an attacker doesn’t care about your compliance” it is sadly still how aspects […]

Crafting an Effective Risk Register

pen signing

Risk is much more than a report shown to the board every quarter. It’s a major point of discussion for any CISO regardless of industry, and not just on the mitigation side. The ability to effectively assess risk is a critical part of any program – but it has to be done realistically. The Challenges […]

Social Engineering: Training your way around the threat

checkmate board

Why is social engineering one of the most widely discussed topics in security? Because it’s one of the most effective offensive tactics, and an inherently human discussion. It’s a concept that is easily understood because it largely plays on emotion. Whether it be fear, compassion, or anger that is used, we can fundamentally understand why […]

9 Tips for Fighting Ransomware

hand on keyboard

Several recent high-profile ransomware attacks have caused organizations to take a closer look at their ability to deal with such an incident. The stakes could scarcely be higher, as ransomware attacks executed by human operators are targeted to bring down global production lines and deny access to business systems – while stealing and then encrypting […]

Has COVID-19 affected your cybersecurity budgets?

budget covid infosec cybersecurity budgets

We ran a survey of cybersecurity professionals on what effect COVID-19 is having on their resources. We found out some interesting facts we would like to share with you. Budgets Over 76% of the respondents said their cybersecurity budgets will increase or that they don’t anticipate them to change. Almost a quarter of them are […]

Cyber Defense in Times of Crisis… and After

lock security infosec

We all know this pandemic has affected the cyber industry in ways we never could have foreseen. According to VMWare Carbon Black, the attacks on banks and another financial organizations were up 38% between February and March and accounted for 52% of the threat traffic on their cloud. The concerns around the pandemic aren’t just […]

Cyber Geopolitics and COVID-19: What could come next?

The long and short term view has always been a requirement for those working in cybersecurity. Right now, the short term involves securing remote working infrastructures, while also responding to skyrocketing COVID-19 phishing lures. Essentially, fighting fires just to keep the organization going, while staying safe and healthy. However, we cannot forget the long term. […]

From the Front Lines: Cyber Community Insights

Dogs barking. Kids getting set up for online learning. Conference bridge crashing. Spouse or roommate is on the phone next to you. It’s 8 am and you haven’t had your coffee yet. Sound familiar? This is the new reality we are living in under COVID-19. For seasoned remote workers and new ones to this lifestyle […]

The CXO Security Threat: Destroying a Brand from the Inside

woman in front of a computer

From video streaming to virtual gaming, our time spent online is hitting an all-time high as people find ways to entertain themselves while being quarantined. We’ve seen loads of our favourite celebrities taking to their social media channels to showcase how they are practicing social distancing and coping with the boredom. This isn’t limited to […]