Category: Company
-
The Importance of Cybersecurity Auditing: Ensuring Compliance and Business Success
The notion of being audited is often associated with negative connotations. It can even be a little scary. Let’s face it, no one wants to get a letter from their country’s tax enforcement division that they are being audited. Whenever there is some type of governmental scandal, the first course of action is to conduct…
-
Are Backdoors Sitting in Your Environment?
Have you ever hidden a house key under a doormat or flowerpot on your porch for a trusted friend to use on occasion? Have you ever made a copy to give to one of your neighbors to use in emergency situations when you are out of town? Ever tape a key to your car underneath…
-
Preventing Insider Threats with a Prevention Program
We like to think that all threats come from the outside, that the people who want to perform malice upon us or our organizations are total strangers. Unfortunately, that is just not the case. An uncomfortable statistic comes from the FBI. According to 2011 homicide data, 54.3% of murder victims were killed by someone they…
-
Building A Cybersecurity Compliance Program
As if IT managers and CIOs didn’t have enough on their plates already, many are finding themselves with another heaping scoop of responsibility to manage: compliance. Various regulatory bodies set compliance requirements, which differ from country to country or even state to state in the US. For a company to be compliant, it must meet…
-
What Is the NIS 2 Directive and How Does It Affect You?
The NIS Directive was adopted in July 2015 and implemented in the European Union on May 9, 2018. The directive published a series of cybersecurity requirements for operators of essential services and digital service providers. The aim was to enhance the security and resilience of critical infrastructure and services by enforcing a high common level…
-
The Security and Financial Advantages of an Outsourced SOC
In a recent article, “Why Outsourcing Cybersecurity is Essential for SMBs,” we explored the difficulties SMBs face when securing their digital assets against cyber threats and briefly discussed the pros and cons of building an in-house security operations center (SOC) versus using an outsourced SOC. In this follow-up post, we’ll take a more practical and…
-
Navigating Cybersecurity Compliance Challenges
Over the past few decades, the business world shifted from filing cabinets overflowing with paperwork to a cloud-first approach where pen and paper are obsolete. Today we live in an almost limitless digital world that has afforded well-intentioned businesses with uncountable advantages. However, as our reliance on technology has grown, so too has the threat…
-
The Importance of Cybersecurity Auditing: Ensuring Compliance and Business Success
The notion of being audited is often associated with negative connotations. It can even be a little scary. Let’s face it, no one wants to get a letter from their country’s tax enforcement division that they are being audited. Whenever there is some type of governmental scandal, the first course of action is to conduct…
-
Are Backdoors Sitting in Your Environment?
Have you ever hidden a house key under a doormat or flowerpot on your porch for a trusted friend to use on occasion? Have you ever made a copy to give to one of your neighbors to use in emergency situations when you are out of town? Ever tape a key to your car underneath…
-
Preventing Insider Threats with a Prevention Program
We like to think that all threats come from the outside, that the people who want to perform malice upon us or our organizations are total strangers. Unfortunately, that is just not the case. An uncomfortable statistic comes from the FBI. According to 2011 homicide data, 54.3% of murder victims were killed by someone they…
-
Building A Cybersecurity Compliance Program
As if IT managers and CIOs didn’t have enough on their plates already, many are finding themselves with another heaping scoop of responsibility to manage: compliance. Various regulatory bodies set compliance requirements, which differ from country to country or even state to state in the US. For a company to be compliant, it must meet…
-
What Is the NIS 2 Directive and How Does It Affect You?
The NIS Directive was adopted in July 2015 and implemented in the European Union on May 9, 2018. The directive published a series of cybersecurity requirements for operators of essential services and digital service providers. The aim was to enhance the security and resilience of critical infrastructure and services by enforcing a high common level…
-
Log4j Is Still Causing Havoc: What We Learned From Log4Shell
If you knew you were at risk for diabetes or cancer, you’d take all the necessary precautions to avoid or delay onset. You’d go for routine checkups and tests to ensure that if signs of the disease appear, you could catch it early, treat it, and hopefully avoid a deadly outcome. A company’s cybersecurity health…
-
Reverse Proxies Are Killing Your MFA
If you’re old enough to remember landlines (or have seen any 1980s or 90s movie about teens looking to put one over on their parents), chances are your parents pulled a real-world man-in-the-middle attack (MITM) on you. There you were as a sneaky teenager plotting with a friend over the phone about going to a…
-
Phishing with GIFShell in Microsoft Teams
People love GIFs. We add them to emails, texts, tweets, and Slack chat groups all day long as we chat away with co-workers, friends, and family. We use them as a communication tool to show emotion and convey a tone when a plain text message might fall flat. If a picture says a thousand words,…
-
Legitimate Platforms Becoming not so Legitimate Playgrounds for Hackers
You would be hard pressed to come up with a more nostalgic image than a child running a lemonade stand in their front yard on a hot afternoon. Unfortunately, there is nothing nostalgic about what some young entrepreneurs are doing today. A team of researchers recently uncovered a group of minors that were running what…
-
Phishing-Resistant MFA Proves Again That Weak Links Should Be Layered with Defense
Cybersecurity is a constant game of the cat chasing the mouse. The cat (a business) continues to believe that with each new plan of attack (i.e., security strategy or tool), it will finally be able to catch the mouse or, in this case, harden its security posture enough to prevent the mouse (a bad actor)…
-
The New Phishing Method That Bypasses MFA
Security experts, including our team at CYREBRO, tout the benefits of using multi-factor authentication (MFA) for an added layer of security. While that is still sound advice, recent research shows that a new phishing technique, which steals authentication cookies through Microsoft Edge WebView2 applications, can render MFA useless if people don’t take other precautions. Discovering…
-
Taking Visibility to a New Level CYREBRO SOC Platform 2.0
Our mission at CYREBRO is to bring state-level cybersecurity to businesses of all sizes and types. We believe that all businesses should always see and understand their cybersecurity with clarity, and have the means and capabilities to mitigate cyber threats against their business. That’s why we are launching a new version of our SOC Platform.…
-
A Smart SOC in space – Protecting the Millennium Falcon
If the title of this blog post grabbed your attention on May the 4th, of all days, then you probably need no introduction to the Star Wars franchise and its’ iconic starship the Millennium Falcon. But just in case you’ve been living under the remnants of the planet Alderaan since its destruction by the first…
-
Utilizing SOC Infrastructure vs MDR – an MSSP perspective
The constant headlines concerning the latest attacks on companies across the industry spectrum serve as constant reminders of the importance of cybersecurity. Digital transformation alone is not enough. You must secure that digital environment, and it’s something that even SMBs have come to realize all too well. Unfortunately, most SMBs lack the technology stack, talent,…
-
13 Questions to ask your SOC provider
As cyber-attacks have become more frequent and complex, there has been a surge in the number of Security Operations Center SOC platforms specializing in threat hunting and incident response. The SOC market is projected to grow from $471 million in 2020 to $1.656 billion by 2025, at a compound annual growth rate of 28.6% during…
-
The Role of a SOC During a Cyber Kill Chain
The cybersecurity kill chain, initially defined by Lockheed Martin, continues to be a general standard inside Information Security to describe how a malicious actor, internal or external, performs an attack. The cyber kill chain 7 stages are defined as: Reconnaissance – Identify vulnerabilities, improperly configured services, and obtain credentials through active or passive methods. Weaponization…
-
The Role of Artificial intelligence (AI) in security operations center (SOC)
In the world of digital warfare, Artificial Intelligence is transforming the Security Operation Centers (SOC) to better respond to cybersecurity threats and attacks. Leveraging AI-Based security tools, such as CYREBRO’s SOC Platform, can provide integration features whereby you will be better able to detect and respond to cybercrimes without an in-house SOC team in place. …
-
Navigating Cybersecurity Compliance Challenges
Over the past few decades, the business world shifted from filing cabinets overflowing with paperwork to a cloud-first approach where pen and paper are obsolete. Today we live in an almost limitless digital world that has afforded well-intentioned businesses with uncountable advantages. However, as our reliance on technology has grown, so too has the threat…
-
Are Backdoors Sitting in Your Environment?
Have you ever hidden a house key under a doormat or flowerpot on your porch for a trusted friend to use on occasion? Have you ever made a copy to give to one of your neighbors to use in emergency situations when you are out of town? Ever tape a key to your car underneath…
-
Building A Cybersecurity Compliance Program
As if IT managers and CIOs didn’t have enough on their plates already, many are finding themselves with another heaping scoop of responsibility to manage: compliance. Various regulatory bodies set compliance requirements, which differ from country to country or even state to state in the US. For a company to be compliant, it must meet…
-
Today’s Cyber Challenge: Multi-Site Security With a Diverse Tech Stack
In today’s globalized economy, it’s easier than ever for businesses to operate in multiple locations, with many crossing borders to reach a broader customer base. While this can bring many benefits, it can also create significant challenges, particularly when managing IT and cybersecurity. As organizations increase their reach, they must work with service providers in…
-
From GDPR to CCPA – Staying Ahead of the Curve in a Rapidly Changing Regulatory Landscape
In 1986, the United States enacted a vital piece of legislation known as the Computer Fraud and Abuse Act (CFAA) to address a rise in computer-related crimes. CFAA made many computer-based offenses illegal, including hacking, computer trespassing, unauthorized access to computers and computer networks, and using computers to commit fraud or access national security information.…
-
The Benefits of Choosing a Reliable MSSP (Part 2 of 2)
Businesses are facing an uphill battle when it comes to cybersecurity. The number of threat actors is multiplying daily, as are their skills and attacks. Simultaneously, security leaders, already dealing with staff and skills shortages, must do more with lower budgets. How can a business amp up its security in such turbulent times? In a…
-
The Benefits of Choosing a Reliable MSSP (Part 2 of 2)
Businesses are facing an uphill battle when it comes to cybersecurity. The number of threat actors is multiplying daily, as are their skills and attacks. Simultaneously, security leaders, already dealing with staff and skills shortages, must do more with lower budgets. How can a business amp up its security in such turbulent times? In a…
-
The Benefits of Choosing a Reliable MSSP (Part 1 of 2)
The last few years have put SMBs in a precarious position, and it doesn’t appear as though their situation will ease any time soon. Current inflation rates and a looming recession have forced many to tighten their belts and reevaluate how their budgets are distributed across different departments. In the wake of several years of…
-
What is the NIST Cybersecurity Framework and How is it Relevant to Your Organization?
We’ve written a lot on the CYREBRO blog about U.S. cybersecurity laws–rules that businesses in specific sectors such as financial services and healthcare are obligated to follow. Today we’d like to introduce a related but different topic: cybersecurity standards, namely the U.S. National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). A standard is…
-
Cybersecurity and Data Protection Laws: EU Healthcare Businesses
Businesses operating in the European Union are subject to the strictest data protection regulation in the world, the General Data Protection Regulation (GDPR). Unlike the United States, the EU doesn’t have an industry-specific cybersecurity law for the healthcare sector. However, healthcare organizations are subject to a new cybersecurity law for businesses in essential industries, known…
-
5 Commonly Overlooked Signs of a Hack
There are security system rules configurations that can indicate these threats, so if you see any one of these, there is a good chance that your system has been compromised somewhere along the way. Someone else is reading your emails! (The Windows Outlook Hack) If you use Microsoft Outlook for your emails, your emails can…
-
Blog – Cybertech TLV 2023 – AI & Cloud & Regulations, Oh My!
Despite the stormy weather, Cybertech TLV 2023 drew in cybersecurity experts and leaders from around the world, gathering in Tel Aviv to share ideas, present solutions, discuss current and future trends, and provide valuable insights into the challenges and opportunities facing the industry. What came as no surprise was the main issue of combating the…
-
CYREBRO’s Most Popular Articles from 2022 – Year End Wrap-up
It’s been three years since COVID first made headlines, and although we’ve come a long way since then, some of our pandemic-coping strategies have become commonplace. For example, the shift to remote work has been embraced by employees who report they have a better work-life balance and are happier, more productive, and more engaged in their work.…
-
Taking Visibility to a New Level CYREBRO SOC Platform 2.0
Our mission at CYREBRO is to bring state-level cybersecurity to businesses of all sizes and types. We believe that all businesses should always see and understand their cybersecurity with clarity, and have the means and capabilities to mitigate cyber threats against their business. That’s why we are launching a new version of our SOC Platform.…
-
CYREBRO’s Fraud Analysis Sheds Light on How to Fight Against BEC and Fraud
Fraud is nothing new and has existed well before the world wide web came into play. But with constant digital transformations and advancements in technology, it’s expected that fraud too will evolve and shift, becoming ever more dangerous and complex. Con artists continue to keep up with security trends, including digital resources, content, and organizational…
-
CYREBRO’s IR Analysis – Visibility Gaps and How to Eliminate Them
Today, the question isn’t if your company will suffer from a security incident, it’s when. A few years ago, a shocking statistic came to light when CYREBRO analyzed internal incident response (IR) reports: 75% of reported security incidents were caused by inadequate investment in security solutions that caused blind spots in network visibility. Unearthing that…
-
Dark Reading panel – The Next Generation SOC with CYREBRO CEO Nadav Arbel
SOCs are taking the center stage as the defenders of the network but many organizations don’t fully understand how to leverage a SOC, leaving them in the dark about the real value they provide. On March 24, CYREBRO’s CEO and founder Nadav Arbel sat together with Ryan Alban Sr. Manager of Global Solution Leads at…