Who has time to read the the countless product fliers, brochures, or watches vendor webinars. But I do make time to read the Cherub cyber-blogs. They are following (and most of the time are ahead of) the industry trends in cybersecurity and data protection while boiling it all down to easy reading.
Success Story: Solutions and Strategies for Elections
The growing presence of cyber threats to elections has resulted in many election organizations scrambling to develop security strategies involving people, processes and technology. When developing these security strategies, organizations should consider a three-part...
Marriott International Fined $124 Million Over Starwood Data Breach
Before you give the go ahead to acquire or merge with another company, consider what happened to Marriott. Also know there is a better way then "just assuming" your new partner has been protecting their castle. Click below to download Richard Stiennon,...
Gartner Report: Selecting the Right SOC for Your Organization
Gartner Report:Selecting the Right SOC for Your Organization Historically, the answer to combatting cyber security threats has been to layer point products to solve individual issues. As a result, U.S. companies have: An average of 85 cyber security tools to manage...
Will Data Breaches bring Class Action Lawsuits?
The US government has attempted to legislate penalties for data breaches, both federally and by state, in hopes of creating incentives for companies and government agencies to better protect personally identifiable information (PII). See all 50 states and their data...
Security firms seeing spike in Iranian cyberattacks
Stuxnet is a malicious computer worm, first uncovered in 2010. Thought to have been in development since at least 2005, Stuxnet targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program. That was then and now Iran...
AI Powered Threat Prevention: Exploring a Cybersecurity Revolution
How Prevention Achieves Superior ROI and Efficacy The application of artificial intelligence (AI) in the cybersecurity market is transforming the industry. AI based threat prevention delivers superior ROI, efficacy, and represents a true paradigm shift for navigating...
How you can identify different types of phishing attacks
Do you know your spear phishing and vishing from your whaling and clone phishing? We explain how to recognize each type of threat. Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch fraudulent...
Active Cyber Defense Strategy Could Use Private Sector AI-based Bounty Hunters to Protect Critical Infrastructure
Concerned about the ability of rogue actors and malignant nation-states to take down the power grid and disrupt the critical financial, transportation, and telecommunications infrastructure of the nation, top U.S. defense strategists are now proposing a strategy of...
Russian Hackers Claim to Have Breached Major Anti-Malware Vendors; How Big Is the Threat?
A group of skilled Russian hackers with a history of infiltrating high-profile targets claim to have stolen the source code used by three major anti-malware vendors based in the United States. Much about this story has yet to be verified, but if true it could force...