Latest Insights
All Topics
- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Data Protection
- Threat Intelligence
- Regulatory Compliance
- Security Takes a Village
- Cybersecurity News
- Education
- C-Suite Accountability
- Security Hygiene
- Endpoint Detection and Response
- Ransomware
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
Cybersecurity Industry
On Ransomware: Government Strategy and Secret Service Tactics
Let’s dive right in.
Regulatory Compliance
Can Your Financial Firm Report Breaches in 36 Hours or Less?
A new federal regulation stipulates an unprecedented cybersecurity breach reporting window of 36-hours or less for just about everyone in the banking ecosystem.
Cybersecurity Industry
Regulatory Compliance
Cybersecurity in Financial Services: How to Protect Your Business From a Data Breach
The alarming rise in security incidents emphasizes the importance of robust security controls.
Cybersecurity Industry
Managed Detection and Response
Why ActZero Won Best MDR Service
In case you missed it, ActZero Managed Detection and Response (MDR) has just been named SC Awards’ Best MDR Service for 2022. This blog post explores the reasons behind the accolade, examining what sets our service apart.
Cybersecurity Industry
Managed Detection and Response
Key Considerations for Healthcare When Choosing a Cybersecurity Partner
We’ve talked a lot in the past about the important criteria for choosing security partners, but never from the unique perspective of healthcare. And, given the need for many healthcare organizations to combat growing ransomware, often with limited budgets, we felt now would be a good time to dig..
Cybersecurity Industry
What Healthcare Can Learn From Finance About Cybersecurity
When you think about the word security, what images come to mind? There’s a pretty good chance a bank vault is one. And for good reason: banks have been in the business of locking down and protecting assets for as long as they’ve been around.
Cybersecurity Industry
Penetration Testing vs Readiness Assessments: The Ultimate Test of Your Defenses
The sharp rise in sophisticated hacking techniques cybercriminals use to infiltrate enterprise computer, and network systems underscore the critical need for a robust defense. To accomplish this, we recommend testing your security tools.
Cybersecurity Industry
6 Easy Ways to Detect Healthcare Data Breaches
Cyber-attacks on healthcare dominate recent news, and ransomware attacks are among the most troubling.1 Recent numbers from the U.S. Department of Health and Human Services show that 2022 has been rife with hacking incidents,2 with hundreds of providers and thousands of individuals affected.
Managed Detection and Response
MDR: An Origin Story
A hero's origin story usually accounts for the source of two things: their power, and their motivation. Often, the audience is already familiar with the hero’s current state. But, what is interesting about these stories is the context from the backstory, and how it enables a great advantage in the..
Cybersecurity Industry
Recall & Precision: Not the Whole Story on Cybersecurity Machine Learning Models
When touting the performance of a machine learning model, companies often cite metrics like recall or precision. However, when it comes to applying such a model to cybersecurity, these numbers can be deceiving. Not necessarily due to any duplicity on the number-citer’s part, but simply due to a..
Cybersecurity Industry
Ransomware
How to Disrupt Quantum Locker Ransomware TTPs
2022-07-14 Update: A breach of 657 providers totalling over 1.9 million patient records from an attack in February of this year was just reported. Quantum Ransomware has been attributed / implicated in this breach. Read on for how to disrupt the TTPs known to be part of this attack. Getting its..
Cybersecurity Industry
Managed Detection and Response
Why Ransomware-as-a-Service is a Problem
As a security engineer specialized in systematizing automated response to security risks, I prioritize understanding emergent threats using tools like Threat Modeling to guide the process. Through the course of my decades long career, I have witnessed the technological and tactical evolution of..
Cybersecurity Industry
Threat Intelligence
4 Ways to Stop Ransomware on the Endpoint
With the global rise in ransomware, multinationals and SMBs believe it is not a matter of if but when an attack will occur. Several companies expect requests for ransom payments (despite warnings from the FBI), while others are convinced their current technology or processes will prevent, or enable..
Cybersecurity Industry
Security Takes a Village
Tenets of Incident Response Postmortem (RCA)
As IT leaders, we invest in people, processes, and technology to prevent cybersecurity incidents, and to plan for potential threats and attacks. But despite our best efforts, we encounter situations that lead to exposed vulnerabilities, hacked systems, and stolen data. The threat, regardless of..
Cybersecurity Industry
Ransomware
Ransomware Task Force: A Year of Action
Ransomware is no longer just a financial crime, it is an urgent security risk that threatens businesses and government agencies around the world. In response to this growing threat, the Ransomware Task Force (RTF) formed in December 2020, under the guidance of the Institute for Security + Technology