breach-attack-simulation

How Will You Focus Your Security Spending in 2019?

As the person in charge of your organization's security, you are having sleepless nights troubled by visions of becoming a victim of a destructive cyberattack or being trashed in the media after a breach. You worry about strengthening the security posture of your organization which requires[...]

Why CIOs Embrace BAS Platforms For Investment Decisions?

According to security and analytics experts, companies worldwide have spent a combined $114b on security products (both hardware and software) and services last year. This figure is expected to exceed $140b by 2021. In 2017, the average cost of one data breach for organizations was $3.62 million[...]

Are You Ready for the Next Cyber-Attack?

Cyber-crooks are masters of crime constantly developing, testing and fine-tuning their techniques to mine valuable and sensitive information for their own profit. As such, cyber-attacks come in a wide range of shapes and forms. To illustrate, cyber-criminals use: Advanced Persistent Threat[...]

Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part III

In our first blogpost about MITRE’s ATT&CK™ framework, we explained what it exactly is and how it contributes to cybersecurity. In our second blogpost, we dove deeper into the various features. In this blogpost, the third and final one in this series, we will discuss the future of MITRE’s[...]

Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part I

Ransomware is on the rise, massive data breaches are announced with scary regularity, and APTs continue to nestle themselves in networks going completely undetected for months and sometimes even years.  Although organizations across all industries keep on increasing their cybersecurity budgets and[...]

Leveraging Cyber Simulation for M&A

Why Cybersecurity Is Critical for a Successful M&A In its “Cybersecurity Is Critical to the M&A Due Diligence Process” research note, Gartner points out that the M&A process is complicated by the inability to integrate and manage the cybersecurity practices of both companies. As part of the due[...]

Dark Web Shopping Center

Black Mirror – Looking at the dark web marketplace for cybercrime We all know about cybercriminals, but do we also understand where they get their tools of the trade? Let’s go the dark side and have look at the black mirror reality of the cybercrime marketplace.

SMBs - The Cybercrook’s Favorite Snack

Cybercrooks just love going after small and medium-sized businesses since they are more vulnerable to cyberattacks than large organizations that have cybersecurity teams and top-notch security solutions in place. This makes those smaller organizations not only more vulnerable, but attacking them[...]

SOC Enhancement With Cymulate KPI

Risk Score KPI Lets Your SOC Rock Your Cybersecurity In the good old days, a security operations center (SOC) was basically a room full of live camera feeds to let the organization see what’s going and to take action if necessary. It started with government agencies, defense departments, followed[...]

Is Your Organization GDPR Ready?

On May 25, 2018, the EU General Data Protection Regulation will come into force. GDPR is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. In our[...]