blog_hero_02

Blog

Cryptojacking - The Latest Cybercrime Play
Eyal Aharoni, December 28, 2017
Read More >
Following the news, you are quite likely awed by the boost in cryptocurrency, especially Bitcoin has made the (financial) headlines. Founded in 2009, it has risen to levels we have seldom seen before. Needless to say, many other cryptocurrencies jumped on the bandwagon and are now catching up with Bitcoin. As detailed in the Global Cryptocurrency Benchmarking Study 2017 of the University of Cambridge, other cryptocurrencies have gained many followers and are traded much higher than ever before.
Read More >
United States Cyber Warfare
Eyal Aharoni, December 21, 2017
Read More >
On Monday December 18, 2017, the White House released a strategy document, calling for stronger defenses against hackers working for criminal enterprises and nations such as Iran, North Korea, China and Russia. In this document, the White House stated that threats targeting cybersecurity pose a threat to the stability of the United States. As outlined in our blog post from November 2 this year, countries such as Iran are boosting their offensive cyber capabilities and spreading their cyber.
Read More >
SOX Compliance Now Includes Cybersecurity
Eyal Aharoni, November 16, 2017
Read More >
SOX Compliance Includes Cybersecurity - Let Cymulate Help You To Navigate The Waters The Sarbanes-Oxley Act (known as SOX) went into effect in 2002 to protect shareholders and the general public from accounting errors and fraudulent practices of organizations. It was also tailored to improve the accuracy of corporate disclosures. SOX was drafted to improve corporate governance and accountability following a number of financial scandals that occurred at Enron, WorldCom, and Tyco as shown below.
Read More >
Iran’s Growing Role in Cyber warfare
Eyal Aharoni, November 2, 2017
Read More >
On October 31, Major General Nadav Padan stated at the Reuters Cyber Security Summit that Iran has been launching an increasing number of attacks on Israel. Padan, who heads the IDF’s C4I and Cyber Defense Directorate, added: “Iran has been responsible for many of the thousands of daily cyberattacks on Israel”. It’s no secret that Iran has been a major villain in our neighborhood for the last couple of decades. Since Iran has a weak conventional.
Read More >
Cyberattacks Are Evolving, and So Does Cybersecurity Technology
Eyal Aharoni, October 27, 2017
Read More >
Organizations of all shapes and sizes are fighting the war against cyberattackers. As we have seen in recent years, cyberattacks are becoming more and more sophisticated, which makes it harder to detect and mitigate them. As cyberattacks evolve, so does security technology and the security assessment methodologies used to detect and fight these attacks. For over a decade, the main methods that organizations were using to verify that their infrastructure and data were secured, consisted of .
Read More >
How to Approach the Demanding 23 NYCRR 500 Regulation
Eyal Aharoni, October 9, 2017
Read More >
In March 2017, the New York State Department of Financial Services (NYDFS) issued a new regulation, the much discussed 23 NYCRR part 500. Considered to be one of the harshest cybersecurity regulations ever to impact companies, it consists of a new set of standards and requirements for banks, insurance companies, and other financial services organizations. It means that all businesses licensed by the New York DFS and "operating under or required to operate under a license, registration, charter,.
Read More >
How Cymulate Assists With ISO 27001 Certification and Compliance
Eyal Aharoni, September 18, 2017
Read More >
The ISO/IEC 27000 family of standards was developed to help organizations with keeping their information assets secure. Of all the ISO 27000 standards, ISO 27001 is the best-known. It is a specification for an information security management system (ISMS), which is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organization’s information risk management processes. As ISO points out, ISO 27001 was developed to "provide a model for.
Read More >
Cymulate Can Help You Comply With GDPR
Eyal Aharoni, August 31, 2017
Read More >
On May 25, 2018, the EU General Data Protection Regulation will come into force. It is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. As the examples in the table show, no organization is safe and the results of such a breach should not be underestimated. Date Victim Breach Fallout 2015 - 2017 Swedish Transport Agency The handling of.
Read More >
PCI Compliance with Cymulate - Keep Payment Data Safe
Eyal Aharoni, August 28, 2017
Read More >
Merchants and companies of all sizes accept and process a multitude of credit card payments. On the downside, this provides a treasure trove for cybercriminals. They go after the millions of stored, processed and transmitted cardholder data. The table below shows some of the most profitable breaches that happened in the last five years. Date Victim Breach Fallout March 24th - April 18th 2017 Chipotle POS systems in 2,250 restaurants were compromised ·   Fines based on the size of the.
Read More >
Helping Healthcare Providers To Keep Their Data HIPAA Compliant
Eyal Aharoni, August 21, 2017
Read More >
During the first half of 2017, cybercrooks were at it again. According to the U.S. Department of Health and Human Services, the sad balance stands at 149 breaches affecting a total of nearly 2.7 million individuals. The 5 Largest US Health Data Breaches in H1, 2017 Entity # Individuals Affected Breach Type Commonwealth Health 697,800 Theft by former employee Airway Oxygen 500,000 Hacker / Ransomware Urology Austin 279,663 Hacker / Ransomware Harrisburg Gastroenterology 93,323 Hacker
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag