Do we need a new standard for network testing and security?

Do we need a new standard for network testing and security?

This question was posed by a Forbes Technology Council member who points out that with the increase in devices connected to networks, cybersecurity has become part of every C-level, staff member and third-party vendor’s role to help manage risk of data...
Ransomware Risk Assessment

Ransomware Risk Assessment

Ransomware attacks are spreading and ransom demands are growing.  22 cities across Texas were recently held hostage for millions after their networks were infiltrated and data was encrypted, and that’s just the latest in a string of cities and businesses being...
Another FTC ruling against business that failed to protect data

Another FTC ruling against business that failed to protect data

The Federal Trade Commission (FTC) has been very proactive in going after business that do not protect their clients from cyber breaches.  This is not only happening with major companies; Foresite was called in to help a small business who was audited and fined more...
What is Credential Stuffing?

What is Credential Stuffing?

Credential stuffing has been in the news because it is a method of attempting to take over accounts of a company by using the databases of known breaches to ‘stuff’ thousands or millions of known credentials into an automated bot and attempting to see if they can get...
What is proactive incident response?

What is proactive incident response?

Incident response as a term is reactive, so it’s no wonder that a proactive approach to incident response is a foreign concept to many clients and resellers that we work with.  Let’s look at a few common scenarios to understand why proactive incident...
Modern Cyber Security – The Cart before the Horse Syndrome

Modern Cyber Security – The Cart before the Horse Syndrome

Ah the rise of the cybersecurity industry. So many tools, so many ‘silver bullets’. Don’t get me wrong this is not necessarily a bad thing. There are gaps and problems and tools are built to solve these problems and address these gaps. The issue is when a security...