How Cymulate Assists Organizations with Their Complicated 23 NYCRR 500 Compliance

In March 2017, the New York State Department of Financial Services (NYDFS) issued a new regulation, the much discussed 23 NYCRR part 500. Considered to be one of the harshest cybersecurity regulations ever to impact companies, it consists of a new set of standards and requirements for banks, insurance companies, and other financial services organizations. …

How Cymulate Assists Organizations with Their Complicated 23 NYCRR 500 ComplianceRead More »

How Cymulate Assists With ISO 27001 Certification and Compliance

The ISO/IEC 27000 family of standards was developed to help organizations with keeping their information assets secure. Of all the ISO 27000 standards, ISO 27001 is the best-known. It is a specification for an information security management system (ISMS), which is a framework of policies and procedures that includes all legal, physical and technical controls …

How Cymulate Assists With ISO 27001 Certification and ComplianceRead More »

Cymulate Can Help You Comply With GDPR

On May 25, 2018, the EU General Data Protection Regulation will come into force. It is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. As the examples in the table show, no organization …

Cymulate Can Help You Comply With GDPRRead More »

PCI Compliance and Cymulate – A Powerful Combination to Keep Payment Data Safe

Merchants and companies of all sizes accept and process a multitude of credit card payments. On the downside, this provides a treasure trove for cybercriminals. They go after the millions of stored, processed and transmitted cardholder data. The table below shows some of the most profitable breaches that happened in the last five years. Date …

PCI Compliance and Cymulate – A Powerful Combination to Keep Payment Data SafeRead More »

Helping Healthcare Providers To Keep Their Data HIPAA Compliant

During the first half of 2017, cybercrooks were at it again. According to the U.S. Department of Health and Human Services, the sad balance stands at 149 breaches affecting a total of nearly 2.7 million individuals. The 5 Largest US Health Data Breaches in H1, 2017 Entity # Individuals Affected Breach Type Commonwealth Health 697,800 …

Helping Healthcare Providers To Keep Their Data HIPAA CompliantRead More »

Why Breach and Attack Simulation Platform Should Be an Integral Part of Your Cybersecurity Arsenal

Cyber-attacks are making cyberspace an increasingly hostile environment for organizations. Despite having security solutions in place, defending against breaches is becoming more and more difficult, as recent cyber-attacks such as WannaCry have shown. Organizations are investing heavily in cybersecurity, and will invest even more in the coming years. IDC predicts that worldwide revenues for security-related …

Why Breach and Attack Simulation Platform Should Be an Integral Part of Your Cybersecurity ArsenalRead More »

Web Applications Vulnerability Is Everyone’s Responsibility

When organizations worry about their cyber security, they focus on ransomware attacks, employees opening (spear) phishing emails or clicking on malicious banners and links on websites. But there is another danger that is often underestimated – the web applications of your own organization could harbor vulnerabilities and security issues. This happens more often than you …

Web Applications Vulnerability Is Everyone’s ResponsibilityRead More »

What CopyKittens Can Teach Us About Cyber-security

Thanks to the experts at ClearSky Cyber Security and Trend Micro, a highly professional cyber spy ring, known as CopyKittens, was exposed in an operation with the codename “Wilted Tulip”. The detailed report published on July 25th 2017, paints an alarming picture. CopyKittens has been active since 2013, maybe even longer, causing havoc worldwide. The …

What CopyKittens Can Teach Us About Cyber-securityRead More »

Petya, NotPetya call it the way you like, it is still Ransomware!

Tuesday June 27th, just a little over than a month had past since the Wannacry ransomware campaign and in just a few hours multiple reports of a worldwide outbreak regarding a new ransomware campaign, some say it is a new variant of “Petya” others call it “NotPetya”. The new Petya ransomware variant infections broke out …

Petya, NotPetya call it the way you like, it is still Ransomware!Read More »