Whitepaper

Starting Your Vendor Risk Management Strategy From Scratch

You’ve heard that vendor dependencies are ripe for malicious abuse and you have read the stories where vendors were used to exploit and infiltrate their customers. Now, you’ve been put in charge of ensuring your vendors, third parties, contractors, and supply chains are at least as secure as you are: Welcome to Vendor Risk Management […]

Starting Your Vendor Risk Management Strategy From Scratch Read More »

The Phishing Breakthrough Point

Eectiveness of Phishing, Training & Understanding the Human Response Executive Summary Utilizing security awareness training and phishing security tests can be a useful and eective tool to reduce unintentional insider threats. However, if robust metrics are not put in place to eectively gauge the click rate patterns from a human landscape perspective, phishing tests can

The Phishing Breakthrough Point Read More »

Improving Legal Compliance Through Security Awareness Training

Introduction Complying with the ever-growing morass of data privacy, security laws and regulations can be a daunting task for any organization. In many instances, these laws and regulations are vague and ambiguous, with little specic guidance as to compliance. Worse yet, the laws of dierent jurisdictions may be, and frequently are, conicting. Reconciling all of

Improving Legal Compliance Through Security Awareness Training Read More »

How to Fortify Your Organization’s Last Layer of Security

Cyber security threats continue to proliferate and become more costly to businesses that suffer a data breach. One reason for that is that hackers have realized it’s easier to find someone who may be willing in a moment of weakness to open an attachment containing malicious content than to exploit technical vulnerabilities within computer software,

How to Fortify Your Organization’s Last Layer of Security Read More »

2020 Phishing By Industry Benchmar king Report

VERIZON’S 2019 DATA BREACH INVESTIGATION REPORT SHOWS THAT PHISHING REMAINS THE #1 THREAT ACTION USED IN SUCCESSFUL BREACHES LINKED TO SOCIAL ENGINEERING AND MALWARE ATTACKS. As cybercrime continues to surge, security leaders must understand that there is no such thing as a perfect, fool-proof, impenetrable secure environment. Many organizations fall into the trap of trying

2020 Phishing By Industry Benchmar king Report Read More »

Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management

Internet of Things (IoT) devices are typically single-purpose, smart objects that are connected to each other, to other components on a local network, or to a cloud via a network to provide functional capabilities. As with any device, to connect to a network securely, an IoT device needs appropriate credentials. A typical commercially available, mass-produced

Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management Read More »

More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

Executive Summary Bitdefender researchers recently investigated a sophisticated APT-style cyberespionage attack targeting an international architectural and video production company, pointing to an advanced threat actor and a South Koreanbased C&C infrastructure. As per reports in the past, APT mercenary groups have been used for cyberespionage by private competing companies seeking financial information or negotiation details

More Evidence of APT Hackers-for-Hire Used for Industrial Espionage Read More »