Mike Talon

Mike Talon is a Solution Architect living and working in New York City. He’s assisted in disaster recovery and migration, Cloud transformation, and identity and security operations and testing for companies ranging from Mom & Pop retail shops to Fortune 100 global companies. Mike currently works with Cymulate – Breach and Attack Simulation; helping customers find ways to live safely in interesting times.

Recent Posts

BAS 101: Why Even Regulated Industries Need BAS Solutions
Mike Talon, July 30, 2020
Read More >
A reader recently asked, "I'm in a regulated industry and do penetration testing once a year for compliance. Why would I also use Breach and Attack Simulation?" Let's dive into this question, as the need for Breach and Attack Simulation (BAS) solutions like Cymulate do not diminish when you are in a regulated environment. In fact, the need for BAS becomes even stronger when you perform pen-testing once a year for regulatory compliance. Here are two reasons:   1 - You only pen-test once a year. .
Read More >
What is Email Gateway Attack Simulation?
Mike Talon, May 20, 2020
Read More >
A site visitor asked “What is an email gateway attack simulation? How is that different from phishing testing?” Both good questions, let’s have a look: Email Gateway Attack Simulation 101 Email gateways are software and/or appliances that sit between inbound email and your users’ mailboxes. These systems evaluate each inbound email (and often outbound email) that is processed by your company’s email systems.  Evaluations can include looking for phishing-like language, checking any links to.
Read More >
What is Breach and Attack Simulation (BAS)?
Mike Talon, April 11, 2020
Read More >
Cymulate 101: What is Breach and Attack Simulation?  One of our site visitors asked a pretty popular question recently: “What, exactly, is Breach and Attack Simulation (BAS)?” Let’s dive in and have a look at this form of security control testing. So, what are "security controls?” Simply put, a security control is anything that limits the ability of a threat actor to accomplish their goal, or otherwise stop even a legitimate user from doing something they shouldn’t.    Security controls can.
Read More >
Remote Working and Cybersecurity Risk
Mike Talon, March 25, 2020
Read More >
Benefits of Working Remotely As the Novel Coronavirus (COVID-19) has entire countries declaring national emergencies and recommending social distancing; more companies than ever are unexpectedly finding that they must allow employees to work remotely in order to limit the speed of the virus spreading throughout our communities.  Remote work has a great number of benefits - especially during a crisis of this nature - but also comes with significant cybersecurity drawbacks that should be.
Read More >
Ransomware Attack Takes Control Over U.S. Pipeline Companies
Mike Talon, February 19, 2020
Read More >
Ransomware Attacks Disrupting United States Pipeline Operations The United States Cybersecurity and Infrastructure Security Agency (CISA) recently released a bulletin describing a ransomware attack on a US natural gas pipeline operator; highlighting how even well-regulated and normally well-secured industries can fall victim to cyber attack if security controls are not regularly tested and refined both individually and while working in tandem.  While a ransomware attack of this nature isn’t.
Read More >

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag