CYREBRO Blog

How to achieve effective cybercrime investigations

Different organizations and companies will define the stages within the lifecycle of a cyber security event a little differently. The National Institute of Standards and Technology (NIST) follows a four-step process of preparation, detection & analysis, containment, eradication & recovery, and post-incident activity. The International Organization for Standardization (ISO) quantifies the process with five stages: prepare, identify, assess, respond…

  • Ransomware – It’s all about the Benjamins

    Ransomware – It’s all about the Benjamins

    It was Ott Biederman, an accountant for American organized crime back at the turn of the 19th century that originally issued the famous immortal line, “Nothing personal, its just business.” That is what ransomware is today – just business. While there are occasional ransomware attacks initiated by state-sponsored groups to bring down the operations of…

  • How to achieve effective cybercrime investigations

    How to achieve effective cybercrime investigations

    Different organizations and companies will define the stages within the lifecycle of a cyber security event a little differently. The National Institute of Standards and Technology (NIST) follows a four-step process of preparation, detection & analysis, containment, eradication & recovery, and post-incident activity. The International Organization for Standardization (ISO) quantifies the process with five stages: prepare, identify, assess, respond…

  • Taking Ownership on Safer Internet Day

    Taking Ownership on Safer Internet Day

    Where would the world be without the Internet?  The Internet allows us to access massive amounts of information in seconds, connect with people all over the globe, educate ourselves on any topic we want, work and collaborate remotely, sell and buy from–and do countless more things that would have been unimaginable just 30 years ago. …

  • How Cyber Resiliency is Weakened by Organizational Struggles

    How Cyber Resiliency is Weakened by Organizational Struggles

    We all know cybercrime is a major threat to businesses, but how much are internal issues impeding your organization’s ability to defend itself? Cyber resiliency is defined as the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources, according…

  • The Evolution of Merging Cybersecurity into Operations

    The Evolution of Merging Cybersecurity into Operations

    How many times do you hear reference being made to the Chief Operating Officer of a company? Certainly, the CEO garners most of the attention as they are the figure head and recognized leader of the company. The CFO receives credit for the financial reporting of the company every earnings season and the CIO or…

  • Why a Tech Agnostic Cybersecurity Vendor is Critical in 2022

    Why a Tech Agnostic Cybersecurity Vendor is Critical in 2022

    Animal Crossing: New Horizons took the world by storm during the pandemic, selling more than 13 million copies in just six weeks. The game was splashed across the news, captivating users stuck at home with limited entertainment options. Nintendo and Nintendo Switch owners welcomed the game’s release, but Xbox users were left out in the…

Loading

Sign Up for Updates