Proactively Securing Your Enterprise Cloud
Somewhere right now, sitting in front of a bank of computer screens in Russia, China, Iran, or even in the United States, is a band of cyber-criminals planning a nation-state grade attack. If they haven’t attacked your network yet, it’s just a matter of time. Taking proactive steps to secure your enterprise cloud now will […]
Weekly Cyber Breakdown
With so much information out there it’s good to know what is top of mind for other industry professionals. We’ll be updating this blog on a weekly basis with the top 10 articles and newsworthy topics in cybersecurity. This is a repository of top trends based on what industry leaders have been discussing most. Think […]
Ransomware: 7 Steps to Take Right Now to Become Ransomware Resilient
In our previous blog, we discusses the infamous question of “to pay, or not to pay?” when a network is hit by ransomware. But what about BEFORE the attack happens? In order to do that we need to talk about being ransomware resilient. What does it mean to be resilient? Being resilient means that a […]
Ransomware: To pay or not to pay, that is the question
State of the ransomware attack. The good, the bad and the ugly… In some ways, the devastating ransomware attacks of the last two years have empowered security officers to obtain the budgets they need to upgrade their organizations’ cybersecurity preparedness and establish more robust security programs to cover people, technology, and procedures. The brazen nation-state […]
Navigating the Crucial Impact of Mergers & Acquisitions on Cybersecurity: Your Ultimate To-Do Checklist
Cybersecurity is not the first item that jumps into your head when talking about mergers and acquisitions. Yet, an in-depth look at the cybersecurity strategy and history of the company targeted for acquisition can lead to substantial cost reduction. More than one deal has been significantly impacted by cybersecurity issues: The Verizon/Yahoo! $350 million decrease […]
The 5 Core Cybersecurity Elements for an Effective CISO Strategy
There is no “one size fits all” with CISO strategies for cybersecurity Over the last six months, we have seen an escalation in the number of reported cyberattacks, in their range, sophistication and in their long-lasting impact on businesses such as the Colonial Pipeline attack, and SolarWinds to name just two. These events obviously highlight […]
The 20-Year Evolution of Nation-State Grade Cyber Attacks and Its Impact on Enterprises Today
Gone are the days when nation-state-grade cyberattacks were the exclusive activity of state actors against state targets. Today, the situation has shifted. State actors still dominate nation-state-grade cyberattacks, but increasingly, non-state attackers purchasing nation-state-grade cyberattack tools on the Darknet, are also leading cyberattacks against private enterprises and even targeting private citizens. The trend for attacks […]
Why Should Nation-State Grade Attacks Be The Focal Point of Your Cybersecurity Strategy?
Anatomy of a nation-state grade attack The 2020 Solar Winds attack, believed to have been launched by Russia’s Cozy Bear (AKA APT29), a Russian hacker group reputedly associated with Russian agencies such as FSB and/or SVR, was a nation-state grade attack. It stealthily “trojanized” an update of SolarWinds’ Orion, an infrastructure monitoring and management software […]
Recent Nation-State Grade Attacks Are a Wake-Up Call for Many Organizations to Improve Cyber Defenses
The Awakening and What’s Behind President Joe Biden’s Executive Order on Cybersecurity There has never been a more opportune time to implement a pro-active cyber-defense strategy against Nation-State grade level threats for both the public and the private sectors in the US. The recent wave of cyber-offenses on government entities, utilities, and businesses have finally […]
What are the keys to a successful cybersecurity strategy? Our CEO Ran Shahor Explains All
According to Ran Shahor, CEO and co-founder of HolistiCyber, a successful cybersecurity strategy should start with a detailed plan. This should place your business requirements, budget, and security posture at the forefront of any other decisions you make to keep your company assets and data secured. How do you build your strategy? Well, for starters, […]