How Cymulate Assists With ISO 27001 Certification and Compliance

The ISO/IEC 27000 family of standards was developed to help organizations with keeping their information assets secure. Of all the ISO 27000 standards, ISO 27001 is the best-known. It is a specification for an information security management system (ISMS), which is a framework of policies and[...]

Cymulate Can Help You Comply With GDPR

On May 25, 2018, the EU General Data Protection Regulation will come into force. It is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. As the[...]

PCI Compliance with Cymulate - Keep Payment Data Safe

Merchants and companies of all sizes accept and process a multitude of credit card payments. On the downside, this provides a treasure trove for cybercriminals. They go after the millions of stored, processed and transmitted cardholder data. The table below shows some of the most profitable[...]

Helping Healthcare Providers To Keep Their Data HIPAA Compliant

During the first half of 2017, cybercrooks were at it again. According to the U.S. Department of Health and Human Services, the sad balance stands at 149 breaches affecting a total of nearly 2.7 million individuals.

Why a Breach and Attack Simulation Platform Should Be an Integral Part of Your Cybersecurity Arsenal

Cyber-attacks are making cyberspace an increasingly hostile environment for organizations. Despite having security solutions in place, defending against breaches is becoming more and more difficult, as recent cyber-attacks such as WannaCry have shown. Organizations are investing heavily in[...]

Web Applications Vulnerability Is Everyone’s Responsibility

When organizations worry about their cyber security, they focus on ransomware attacks, employees opening (spear) phishing emails or clicking on malicious banners and links on websites. But there is another danger that is often underestimated - the web applications of your own organization could[...]

What CopyKittens Can Teach Us About Cyber-security

Thanks to the experts at ClearSky Cyber Security and Trend Micro, a highly professional cyber spy ring, known as CopyKittens, was exposed in an operation with the codename “Wilted Tulip”. The detailed report published on July 25th 2017, paints an alarming picture. CopyKittens has been active since[...]

Watering Hole Attack: "Don't Drink the Water"

A Watering Hole attack is an attack method in which the attacker seeks to compromise a specific group of end users by infecting websites that members of that group are known to visit. Watering Hole attacks have been adopted in attacks conducted by criminal enterprises and nation states alike. The[...]

Petya, NotPetya call it the way you like, it is still Ransomware!

Tuesday June 27th, just a little over than a month had past since the Wannacry ransomware campaign and in just a few hours multiple reports of a worldwide outbreak regarding a new ransomware campaign, some say it is a new variant of "Petya” others call it “NotPetya”.

Cyber-Crime Rising

Cyber-Crime is on the Rise! As part of its annual routine, the FBI’s Internet Crime Complaint Center (IC3) released on June 21st 2017 its 2016 Internet Crime Report, describing the numbers and types of cyber-crimes reported to IC3. The report shows that during 2016, the IC3 received a total of[...]