Category: Best Practices

  • Utilizing SOC Infrastructure vs MDR – an MSSP perspective

    Utilizing SOC Infrastructure vs MDR – an MSSP perspective

    The constant headlines concerning the latest attacks on companies across the industry spectrum serve as constant reminders of the importance of cybersecurity. Digital transformation alone is not enough. You must secure that digital environment, and it’s something that even SMBs have come to realize all too well. Unfortunately, most SMBs lack the technology stack, talent,…

  • Dark Reading panel – The Next Generation SOC with CYREBRO CEO Nadav Arbel

    Dark Reading panel – The Next Generation SOC with CYREBRO CEO Nadav Arbel

    SOCs are taking the center stage as the defenders of the network but many organizations don’t fully understand how to leverage a SOC, leaving them in the dark about the real value they provide.   On March 24, CYREBRO’s CEO and founder Nadav Arbel sat together with Ryan Alban Sr. Manager of Global Solution Leads at…

  • CISO Series Podcast Featuring CYREBRO’s CTO, Ori Arbel – What’s Next in Security?

    CISO Series Podcast Featuring CYREBRO’s CTO, Ori Arbel – What’s Next in Security?

    In this episode of CISO Series, we CYREBRO’s CTO, Ori Arbel, discussing the latest cybersecurity trends with the show hosts, cybersecurity journalist, David Spark, and veteran CISO, Andy Ellis. From the start of COVID and the cloud migration rush that followed, to practical tips to help improve incident response planning, the group discusses how to…

  • Lapsus$ Breaches Okta to Reach Customers’ Sensitive Data

    Lapsus$ Breaches Okta to Reach Customers’ Sensitive Data

    Lapsus$ Breaches Okta to Reach Customers’ Sensitive Data Traced back to January of this year, Okta, a publicly traded identity and access management company announced yesterday that it has been impacted by a cyber-attack claimed by the data extortion group Lapsus$. Okta and Lapsus$ disagree regarding the success of the breach, while companies like Cloudflare…

  • Ransomware Myths SMBs Need to Be Familiar With

    Ransomware Myths SMBs Need to Be Familiar With

    Ransomware attacks are skyrocketing so quickly alarm bells should be going off at every company. No one is safe, and experts predict 2022 will be a devastating year for ransomware attacks. This should come as no surprise, as attackers these days don’t even need to write their own ransomware code. They can launch an attack…

  • Disaster Recovery vs. Cyber Recovery – Different Plans Preparing for Different Struggles

    Disaster Recovery vs. Cyber Recovery – Different Plans Preparing for Different Struggles

    As Bob Dylan so eloquently said in his classic song from the 1960s, “Times they are a-changin,” sixty years later they still are. Modern society has grown accustomed to change. It’s the pace of it that can cause you to catch your breath at times.  Just as the bulk of rock and country music is…

  • The Evolution of Merging Cybersecurity into Operations

    The Evolution of Merging Cybersecurity into Operations

    How many times do you hear reference being made to the Chief Operating Officer of a company? Certainly, the CEO garners most of the attention as they are the figure head and recognized leader of the company. The CFO receives credit for the financial reporting of the company every earnings season and the CIO or…

  • The Cloud’s Effect on Evolving Security Roles

    The Cloud’s Effect on Evolving Security Roles

    Businesses have changed how they operate in countless ways during the coronavirus pandemic, including accelerating migration to cloud technologies. Before COVID, businesses had the luxury of managing the cloud transition at their own pace. But when the pandemic hit, ushering in a new era of remote work, many businesses moved to cloud-based technologies without necessarily…

  • Dangers in the Cloud – When Remote Work Migrations are Rushed

    Dangers in the Cloud – When Remote Work Migrations are Rushed

    For several years now the world has been steering enterprises to the cloud, and the trend is only growing. The cloud is marketed as a utopia that will free you of all the problems that plague you currently in your on-prem world. There are so many reasons to move to the cloud, such as the…

  • Why SMBs Are A Prime Cybersecurity Target

    Why SMBs Are A Prime Cybersecurity Target

    Data breaches and stolen information are a regular occurrence in the business world today, with SMBs at almost constant risk of attack. In fact, as mentioned in the 2021 SMB IT security report by Untangle, 43% of cyber-attacks target small businesses, with attacks continuing to increase year by year. This is causing huge issues for…

  • Insider Threats Are Worse Than You Thought

    Insider Threats Are Worse Than You Thought

    The Trojans figured out that it’s much easier to open a gate from the inside rather than try and batter it down from the outside, and your organization is no different. Insiders may be using the same tactics as the Trojans did all those years ago on your organization today. In this article, we will…

  • RaaS: The Rapid Growth of The Ransomware-as-a-Service Business Model

    RaaS: The Rapid Growth of The Ransomware-as-a-Service Business Model

    Cybercriminals are driven by the profit motive, and few activities are more profitable to them than deploying ransomware against unsuspecting businesses. Ransomware is a type of malware that uses encryption to block or limit users from accessing systems–such as databases, file servers or applications–until a ransom is paid. Ransomware attacks have risen sharply in the…

  • The 7 Steps to Effective Incident Response

    The 7 Steps to Effective Incident Response

    Cybercriminals have been around for as long as the Internet, and they are becoming bolder and more sophisticated with each passing day.  Yet incredibly, the majority of businesses are still not ready to respond to cyberattacks or breach events, according to a recent FireEye survey of 800 chief information security officers and other senior executives from around the world.  In a recent study by the Ponemon Institute,…

  • Don’t Get Hooked by a Phishing Scam

    Don’t Get Hooked by a Phishing Scam

    After a brief decline in 2019, phishing attacks spiked again in 2020. Last year, they were so prevalent that one in every 4,200 emails was a phishing scam. Businesses lost approximately $17,700 every minute due to a phishing attack. Research from the FBI’s Internet Crime Complaint Center found that phishing (including vishing, SMiShing, and pharming) was one of the biggest cyber threats,…

  • Honoring the Fathers (and Mothers) of Cybersecurity on July 4th

    Honoring the Fathers (and Mothers) of Cybersecurity on July 4th

    The United States of America would never have existed (at least not in the way we know it) if not for the contributions of a small group of visionaries we know as the Founding Fathers. These men – John Adams, Benjamin Franklin, Alexander Hamilton, John Jay, Thomas Jefferson, James Madison, George Washington, and a host…

  • The 5 Top Challenges for DevSecOps to Address

    The 5 Top Challenges for DevSecOps to Address

    It’s said that crime rises in times of social and economic upheaval, and this is certainly the case for cybercrime. In a 2020 survey by VMware Carbon Black, 90% of security professionals reported an increase in the volume of cyberattacks and 80% said attacks had become more sophisticated. A recent study by Cybersecurity Ventures concluded…

  • Cybersecurity Isn’t Enough: You Need A Human Intelligence Team

    Cybersecurity Isn’t Enough: You Need A Human Intelligence Team

    Cybersecurity threats are growing in number and sophistication every year. Since 2017, the industry has seen a year-over-year increase of 27%, with hundreds of millions of attacks occurring every day in 2020. As we saw with the SolarWinds attack and the recent attack on US fuel pipeline operator Colonial Pipeline, even the best cyber defenses implemented by…

  • What Is a SOC Platform and How It Can Help IT Professionals to Excel in Their Job

    What Is a SOC Platform and How It Can Help IT Professionals to Excel in Their Job

    Will your company survive if there is a breach of its data infrastructure? According to a prediction by Cybersecurity Ventures, businesses around the world are more likely to fall victim to ransome attacks every 11 seconds in 2021, compared to 14 seconds in 2019.   In todays’ business landscape, a single data breach can cause a…

Sign Up for Updates