-
Why Bad Actors are Transitioning to Rust
Round and round we go. It’s the nature of cybersecurity. Hackers discover an exploitable attack avenue, and a patch is then created to block it, except it doesn’t end there. Hackers just find another vulnerability and the battle rages on. It’s not just cybersecurity companies that must constantly innovate to remain relevant. Hackers must do…
-
Legitimate Platforms Becoming not so Legitimate Playgrounds for Hackers
You would be hard pressed to come up with a more nostalgic image than a child running a lemonade stand in their front yard on a hot afternoon. Unfortunately, there is nothing nostalgic about what some young entrepreneurs are doing today. A team of researchers recently uncovered a group of minors that were running what…
-
Phishing-Resistant MFA Proves Again That Weak Links Should Be Layered with Defense
Cybersecurity is a constant game of the cat chasing the mouse. The cat (a business) continues to believe that with each new plan of attack (i.e., security strategy or tool), it will finally be able to catch the mouse or, in this case, harden its security posture enough to prevent the mouse (a bad actor)…
-
SOC1, SOC2, SOC3 – Understand What You Need
Why does your business need compliance to grow? SOC compliance is crucial for those in service organizations. There are various compliance standards and accreditations that your business can work towards and ascertain, such as ISO 27001, NIST 800-53, and FEDRAMP, just to name a few. But arguably the most widely recognized and respected is SOC,…
-
Common Entry Points #5 – External Vendors
Tag, you’re it! That infamous saying may remind you of your childhood, but it’s also applicable to the never-ending game threat actors play. They hunt around looking for unsuspecting victims who simply haven’t paid attention to their security gaps and left their organization’s vulnerabilities unaddressed. With just a tap, hackers can deliver the same deadly…
-
Why a SOC Has Become a Top Requirement for Cyber Insurance
It seems that everyone is trying to identify the next bubble to take some type of advanced action to avoid it or take advantage of it. Many of us have lived through more than one. There was the IT bubble at the start of the century followed by the housing bubble in 2008. Bubbles are…