Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Forescout: Expose Unmanaged Devices Across Your Digital Terrain

The growth and exposure of IoT devices and their connectivity with Building Automation Systems (BAS) devices offer attackers alternative ways to compromise business continuity for a financial institution: attackers do not need to reach and compromise critical servers directly, they can exploit IoT/BAS to compromise the infrastructure around them, by e.g. shutting down power or cooling of server rooms; they can compromise physical access control systems to gain unauthorized to buildings or rooms, or to prevent authorized personnel from accessing them; or they can disrupt HVAC or elevator systems on a hot day causing health and safety concerns.

Forescout: Building Cyber Resiliency for Your OT Network

In manufacturing and critical infrastructure networks, the risks stemming from the increased use of Industrial IoT devices for process measurements and control and the connectivity of OT and IT systems for efficiency and automation makes critical process networks more exposed. Without proper visibility into OT networks and devices, it is impossible for OT organizations to determine the extent and impact of a breach on the IT network to critical processes, and may cause preventive and very costly shutdowns like in the case of Colonial pipelines.

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount of money invested in IT infrastructure is increasing at an exponential rate. Further, dedicated teams are formed to monitor and optimize the performance of the different solutions that each organization has in its environment. Similarly, when it comes to cybersecurity, it’s become essential to evaluate and quantify the security posture of every organization.

The Importance of Cybersecurity Compliance Training for Your Business

The importance of cyber security compliance training cannot be underestimated, especially in the current era where we are seeing an increasing number of cybercrimes in the industry. As a business owner, conducting cybersecurity compliance training is now not just an option but an essential part of cybersecurity and various compliance programs. Unfortunately, most businesses are still far from taking such training programs seriously.

A pragmatic approach to risk management & resilience

Cybersecurity starts with the ability to recognize your cyber risk. We will explore several topics related to taking a practical approach to managing risk and achieving cyber resilience. This is a blog series with collective thoughts from Bindu Sundaresan, Director AT&T Cybersecurity, and Nick Simmons, AVP, Cybersecurity. Cybercrime has become increasingly frequent, complex, and costly, posing a risk to all businesses regardless of size. How do you plan to respond when falling victim to a breach?

8 Poor Privileged Account Management Practices and How to Improve Them

Establishing proper privileged account management procedures is an essential part of insider risk protection. There are some common mistakes companies make when managing accounts of privileged users. In this article, we overview eight widespread poor account management practices, analyze their consequences, and discuss ways to improve them. We also take a look at Ekran System’s account management capabilities that you can benefit from.

Why Is Cybersecurity Important?

Cybersecurity is important because of the major risk data breaches pose. Now more than ever, personal and confidential data such as banking information, addresses, or financial documents are being shared and saved online. Without proper cybersecurity, this data becomes an easy target for cyberattacks which can cause monetary and reputational damage to people and businesses. Cyberattacks take on different forms.

The secret is out: Why Open Security is key to preventing cyber threats

For decades, the cybersecurity industry has been shrouded in secrecy. This is partly because of the misunderstanding that cybersecurity often relies on obscurity as its primary form of defense. As the thinking goes, if adversaries don’t know about or understand the security controls that security vendors have in place, it will be easier to defend against cyberattacks.