Defend Like an Attacker: 4 Required Approaches

cyber attacker

Brig. General Ran ShahorCEO and Co-Founder, HolistiCyber Our CEO and Co-Founder, Brigadier General (Ret.) Ran Shahor  (pictured on the left) was recently featured in Security Magazine relaying his extensive knowledge around nation-state cyber attackers and how to defend against them. Despite the cliché “an attacker doesn’t care about your compliance” it is sadly still how […]

Utilities and Cybersecurity: Keeping the Lights On – Both On and Offline

utilities cybersecurity

Utilities have a very unique challenge in the cyber arena. You are not only responsible for keeping up with the evolving threats that plague other organizations, but also keeping people’s lifelines open. Just look at what is happening in Texas right now. Thousands of people are without power and water in the middle of a […]

Google TAG team reports: Nation-State attacks can happen to anyone

Early last week Google’s Threat Analysis Group (TAG) posted a blog outlaying a nation-state attack targeting security researchers. Using social engineering and social media these threat actors were able to create “credibility” within the industry. They claimed false credit for vulnerabilities and interacted with researchers under the guise of wanting to “collaborate” with them on new […]

Cyber Threats in 2021: What to watch out for

watch for cyber threats

December 2020 was a massive month in cybersecurity. Between SolarWinds, FireEye, and Microsoft, every cyber professional was on edge, and we can expect to see our fair share of notable cyber threats this year as well. So what can we do about it? Our nation-state grade cyber defense experts pulled their heads together to bring […]

The 12 Days of Security

holidays

We are all familiar with the (verrrrrry long) holiday favorite 12 Days of Christmas. While security goes WELL beyond 12 days, we wanted to share 12 of our resources to help you in your cyber defense journey this holiday season. https://youtu.be/sdJq7sUPgP8 A Weekly Cyber Breakdown Every week our team uses an AI engine to pull […]

SolarWinds: Preventing and Hunting other MSP Attacks

solarwinds MSP breach supply chain

The SolarWinds breach has again exposed the trusted supply chain as a favored method of cyber-attack. Nation-state level threat actors compromised its software updates in order to rollout backdoor access among its customer base. The network management and monitoring powerhouse has upwards of 300,000 customers across enterprise and government, so the potential fallout from this […]

Red Team vs. Blue Team: Discussing the Divide

red team vs blue team

Peter Cohen, Managing Director, EMEA Red Team vs Blue Team– most people in cybersecurity agree that the gap between the two sides of the industry remains vast. Red-teams work with potent combinations of creativity, training, research, and industry kudos. This is just as well if they are to replicate the kind of attacks seen in […]

FireEye Breach: What to Know

fireeye security infosec breach

Who is FireEye? FireEye provides cybersecurity products (endpoint and network) to detect and prevent against advanced threats. A few years ago FireEye bought Mandiant, one of the world’s premier cybersecurity consultancies, particularly in Incident Response. Together, the product and consulting business has had success worldwide and has several government contracts including in the US. What […]

Bringing Security into Compliance

security compliance

Security teams are already overwhelmed with keeping up with threats and protecting the network and the data that flows within it. Especially when working in a highly regulated industry such as finance, healthcare, or utilities, it can be a real challenge to keep up with all the changes in regulation. What’s wrong with compliance? We […]

The State of the Nation: Incident Report in the U.K.

uk data breach report

“Phishing incidents are up 56% between 2019 and 2020, and hardware/software misconfigurations are up 44%.” We are all familiar with the Verizon Data Breach Report: it’s a guidebook on where the cyber world is with incidents globally. While this is an invaluable asset to the industry each part of the world has their own nuances […]