• Decrypting Dollars – Understanding the $10.5T Threat

    Decrypting Dollars – Understanding the $10.5T Threat

    In 2020, Cybersecurity Ventures published a significant statistic: cybercrime was forecasted to cost the world $10.5 trillion annually by 2025. This figure represented the predicted market value of cybercrime and served as an alarming indication of the escalating growth and scale of attacks to come. It sent a wave of panic through the business world and set…

  • Alert Overload: False Positives’ Hidden Costs in Cybersecurity 

    Alert Overload: False Positives’ Hidden Costs in Cybersecurity 

    Let’s say you just bought a new house. Even though it’s in a gated neighborhood with security guards, you don’t want to risk anything, so you install a state-of-the-art security system. Every day, you get a flurry of alerts on your phone, triggered by your family coming and going through the front door, opening a…

  • Threat Attribution – Connecting the Dots to Empower Cybersecurity Defense 

    Threat Attribution – Connecting the Dots to Empower Cybersecurity Defense 

    In the realm of cybersecurity, threat attribution is akin to the investigative methods of the legendary detective Sherlock Holmes. Just as Holmes used his acute observation skills and deductive reasoning to pinpoint the perpetrator in a mystery, threat attribution involves meticulously analyzing cyberattacks to trace their origins and identify the attackers. In his classic form,…

  • DFIR To the Rescue – The Cybersecurity Joker 

    DFIR To the Rescue – The Cybersecurity Joker 

    Picture this: A person arrives at the office Monday morning, and panic sets in when he logs onto the company network. His screen displays an ominous message explaining the company’s files have been stolen and encrypted, and the company has 48 hours to make contact and pay a ransom or lose access forever. The man…

  • Retail’s Double-Edged Sword: Acceleration, Vulnerability, and Cybersecurity 

    Retail’s Double-Edged Sword: Acceleration, Vulnerability, and Cybersecurity 

    The retail industry has experienced a seismic shift in recent years, instigated by the COVID-19 pandemic and fueled by other industries rapidly digitizing their organizations. Adapting their businesses to e-commerce models was a lifeline for many retailers, but it also came at a cost: the broader the attack surface, the greater the vulnerability. Retail is…

  • Bolstering Your Cyber Armor: The Key Steps in Vulnerability Remediation 

    Bolstering Your Cyber Armor: The Key Steps in Vulnerability Remediation 

    After nearly a decade of relatively stable numbers, there was a dramatic spike in newly discovered common vulnerabilities and exposures (CVEs), going from just under 6,500 in 2016 to over 14,700 in 2017. Since then, the number has only grown exponentially. HackerOne’s ethical hackers identified a whopping 65,000 vulnerabilities last year. According to those hackers, the rapid pace…

Loading

Sign Up for Updates