Blog
Unveiling the Unsung Hero: The Power of Threat Intelligence
Let’s say you’re going on vacation next week to a foreign country. You need to know the weather so you can pack appropriately. You open a weather app, enter your destination, and see that it will be warm, but there’s a slight chance of rain, so you throw an umbrella into your bag. Behind the…
-
Healthcare Cyber Defense Through Greater Visibility and Early Detection
Extortion is about leverage. The more leverage you can attain, the greater the chance that an extortion attempt will prove successful. A ransomware attack is a classic example of an extortion maneuver. A ransomware gang encrypts the systems and data repositories that an organization’s business operations depend on. At that point, everything grinds to a…
-
Unveiling the Unsung Hero: The Power of Threat Intelligence
Let’s say you’re going on vacation next week to a foreign country. You need to know the weather so you can pack appropriately. You open a weather app, enter your destination, and see that it will be warm, but there’s a slight chance of rain, so you throw an umbrella into your bag. Behind the…
-
Securing Healthcare in a Digital Age
Today, digitization has become the norm across industries. Businesses of all sizes are adopting new technologies and processes to stay competitive, operate more efficiently, and deliver the best possible services and experiences to customers. While the shift to a digital-first approach has come with a wealth of benefits, the neck-breaking speed of digitization has made…
-
How to Prepare for a Successful Cybersecurity Audit
The Dodd-Frank Wall Street Reform and Consumer Protection Act enacted in 2010 required the U.S. Federal Reserve to conduct annual stress tests for banks with a minimum amount of assets. C-suite leadership of these banks take these stress audits very seriously and devote ample resources and efforts to prepare for these reviews. This includes their…
-
Alert Prioritization – Correlations Create Context, Context Creates Clarity
How many times have you seen the following scenarios play out? A big news event occurs, and TV networks rush to get the story out before everybody else. Unfortunately, the early conclusions made about the event turn out to be completely wrong once additional facts come out. In another example, a video snippet showing someone…
-
Security-Focused Patching Best Practices
As cyber threats become more sophisticated and prevalent, organizations of all sizes face an ever-increasing risk of becoming victims. That isn’t hyperbole. Check Point Research found that cyberattacks increased by 38% in 2022, compared to 2021, and weekly attacks increased by 7% in the first quarter of 2023 compared to the same quarter in 2022. While businesses must…