by Terry Crowley | Nov 13, 2019 | Penetration Testing
Reading Time: 2 minutes
One of the challenges of my job is about once every five weeks or so our marketing director shakes me down for a blog topic. If I don’t have one in mind he tries to brainstorm with me. “What’s going on in your practice that’s new or...
by John Verry | Aug 20, 2019 | Security Awareness Training
Reading Time: 2 minutes
In part 1 of this post I applied “the 80/20 rule” to cyber security. The goal is to mitigate about 80% of your InfoSec risk with 20% of the effort, by addressing the biggest risk—social engineering and especially phishing attacks....
by Terry Crowley | Nov 27, 2018 | ISMS Consulting
Reading Time: 2 minutes
A recent report from tCell that analyzed more than 316 million security incidents shares key data on the most common real-world attacks targeting in-production web applications. One statistic that caught my eye is that it took an...
by Richard Barrus | Jul 17, 2018 | Third Party Risk Management
Reading Time: 3 minutes
For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely completed. Based on the findings from this effort, we’ve identified those areas where many...
by Mike Gargiullo | Apr 25, 2018 | InfoSec Strategies
Reading Time: 2 minutes
A number of threat researchers are now reporting a massive and sustained spike of almost 500% in the volume of illicit cryptocurrency mining transactions on corporate networks. Trend Micro is hypothesizing that crypto mining...