Tagged: Cybersecurity Tools

  • Faster Processors, Means Faster Threats, and Less Time to Waste

    Faster Processors, Means Faster Threats, and Less Time to Waste

    It is another example of the law of unintended consequences. What is originally deemed to be a benefit to society can also have a dark side, comprised of unforeseen circumstances and unexpected interactions between different entities. There are many examples of this. For instance, it seems natural that governments should regulate the introduction of new…

  • From GDPR to CCPA – Staying Ahead of the Curve in a Rapidly Changing Regulatory Landscape

    From GDPR to CCPA – Staying Ahead of the Curve in a Rapidly Changing Regulatory Landscape

    In 1986, the United States enacted a vital piece of legislation known as the Computer Fraud and Abuse Act (CFAA) to address a rise in computer-related crimes. CFAA made many computer-based offenses illegal, including hacking, computer trespassing, unauthorized access to computers and computer networks, and using computers to commit fraud or access national security information.…

  • AI Assistant, Friend, Foe, or Demigod?

    AI Assistant, Friend, Foe, or Demigod?

    When the telephone was first marketed, many predicted it to be a failure as it was assumed that people wouldn’t want to give others a way to bypass their front door and invade the privacy of their home. Despite the plethora of time-saving appliances and gadgets introduced and acquired over the years; people still complain…

  • How to Prevent the Cybersecurity Talent Gap from Slowing You Down  

    How to Prevent the Cybersecurity Talent Gap from Slowing You Down  

    Nearly every type of business has had to contend with staffing shortages of some type over the past few years. Talent that is in demand is hard to find, and it’s especially true in cybersecurity. Unfortunately, the lack of cybersecurity professionals in the field today presents greater challenges than just filling job openings.  The Consequences…

  • Phishing-Resistant MFA Proves Again That Weak Links Should Be Layered with Defense

    Phishing-Resistant MFA Proves Again That Weak Links Should Be Layered with Defense

    Cybersecurity is a constant game of the cat chasing the mouse. The cat (a business) continues to believe that with each new plan of attack (i.e., security strategy or tool), it will finally be able to catch the mouse or, in this case, harden its security posture enough to prevent the mouse (a bad actor)…

  • Common Entry Points #4 – RDSH

    Common Entry Points #4 – RDSH

    If there is a weak point in your IT environment, it’s only a matter of time before a threat actor exploits it. So far, our series of “Common Entry Points” has scrutinized ITaaS (IT-as-a-Service), VPNs, and unpatched and obsolete OSS, all based on real incidents CYREBRO has dealt with. Now, we’ll look at another common…

Sign Up for Updates