Report on Ransomware Q4 2019

Report on Ransomware Q4 2019

A look at the recently released cybercrime report by Malwarebytes that focuses on ransomware has some interesting takeaways: First the United States is the target 53% of the time. Canada came in second at a distant 10%.The top 5 states targeted were in order: Texas,...
Do we need a new standard for network testing and security?

Do we need a new standard for network testing and security?

This question was posed by a Forbes Technology Council member who points out that with the increase in devices connected to networks, cybersecurity has become part of every C-level, staff member and third-party vendor’s role to help manage risk of data...
The Importance of Source Code for Web Application Penetration Testing

The Importance of Source Code for Web Application Penetration Testing

Overview It is a common misconception that a web application penetration test and bug bounty program are the same thing. Although a lot of the skills transfer over and the methodology is very similar, the biggest difference between the two is that a bug bounty program...
Case study – Cyber monitoring insurance claim coverage examples

Case study – Cyber monitoring insurance claim coverage examples

We’ve all heard the phrase “there is no silver bullet”, especially when it comes to cyber protection.  There are so many different methods of attack and avenues of exposure, and they constantly evolve.  So how do you protect your customer’s...
The Future MSP

The Future MSP

Managed Service Providers (MSPs) are facing increasing challenges to support their customers as cybersecurity and compliance needs continue to grow.  Many look to build their own Security Operation Center (SOC), select and purchase a SIEM tool and staff the SOC to...