Cyber Risk Management: Organize & Equip
This is the third in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness Cycle to Cyber Risk Management (read parts one and two here). One approach to supporting preparedness — which we defined as a continuous cycle of planning,...
LGBT Pride: Celebration And Security During Heightened Tensions
We assess that while the month will be largely peaceful and do not expect significant security incidents, there is an increased likelihood of smaller scale violence at LGBT events and / or targeting LGBT-associated individuals and organizations. As recently as 2015,...
Cyber Risk Management: Preparedness and Operational Planning
This is the second in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness Cycle to Cyber Risk Management (read part one here). There are a number of ways to mitigate risks. In some instances, we assess the risk as low or the...
Terminology for $500. What Are Blended Attacks?
About a week ago, as we were coming out of the initial concerns relating to the WannaCry ransomware outbreak, I shared the following thought on LinkedIn: “WannaCry brings up a thought I often have - what is the best way to capture cyber incidents with physical...
Gate 15 Threat Advisory, 25 May 2017
This week, terrorists have conducted attacks in the United Kingdom, Indonesia, the Philippines, Somalia (and other parts of Africa), as well as ongoing fighting in Iraq and Syria. On 15 May, the US Department of Homeland Security released an updated National Terrorism...
Hurry! Transfer Money… (oh and keep this a secret for now…)
Business Email Compromise (BEC) is a more specific form of Email Account Compromise (EAC). Email accounts can be compromised by guessing email credentials, obtaining access by the interception of email credentials, encryption keys, or gaining email account information...