blog_hero_02

Blog

Seeing the Unseen: Detecting and Preventing the Advanced Persistent Threat
Eyal Aharoni, January 31, 2019
Read More >
In the last few years, APT attacks conducted by individual cybercriminals, organized crime and state-sponsored groups have become prevalent and sophisticated, bypassing standard security controls such as APT, or Advanced Persistent Threat, is a sophisticated attack in which a person or group attains access to a network and remains undetected for an extended period of time.   The DarkHydrus APT Attack Let’s have a closer look at how APT threat actors operate by looking at a recent APT attack,.
Read More >
Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part II
Eyal Aharoni, June 28, 2018
Read More >
In our first blog post, we explained what MITRE’s ATT&CK™ framework is and how it can assist with cyber security. In this blog post, we will have a closer look at how Cymulate’s BAS platform can utilize the ATT&CK framework to boost the security posture of organizations. In general, MITRE’s ATT&CK™ and Cymulate’s BAS platform are perfectly in sync, which is good news for organizations and bad news for cybercrooks. Cymulate covers all Tactics and Techniques of MITRE’s ATT&CK™ matrix an.
Read More >
Leveraging Cyber Simulation for M&A
Eyal Aharoni, May 21, 2018
Read More >
Why Cybersecurity Is Critical for a Successful M&A In its “Cybersecurity Is Critical to the M&A Due Diligence Process” research note, Gartner points out that the M&A process is complicated by the inability to integrate and manage the cybersecurity practices of both companies. As part of the due diligence process, the acquiring company needs to examine the cybersecurity history and policies of the organization that it wants to acquire very carefully, as illustrated by the takeover of Yahoo by.
Read More >
How to Approach the Demanding 23 NYCRR 500 Regulation
Eyal Aharoni, October 9, 2017
Read More >
In March 2017, the New York State Department of Financial Services (NYDFS) issued a new regulation, the much discussed 23 NYCRR part 500. Considered to be one of the harshest cybersecurity regulations ever to impact companies, it consists of a new set of standards and requirements for banks, insurance companies, and other financial services organizations. It means that all businesses licensed by the New York DFS and "operating under or required to operate under a license, registration, charter,.
Read More >
PCI Compliance with Cymulate - Keep Payment Data Safe
Eyal Aharoni, August 28, 2017
Read More >
Merchants and companies of all sizes accept and process a multitude of credit card payments. On the downside, this provides a treasure trove for cybercriminals. They go after the millions of stored, processed and transmitted cardholder data. The table below shows some of the most profitable breaches that happened in the last five years. Date Victim Breach Fallout March 24th - April 18th 2017 Chipotle POS systems in 2,250 restaurants were compromised ·   Fines based on the size of the.
Read More >
Why a Breach and Attack Simulation Platform Should Be an Integral Part of Your Cybersecurity Arsenal
Eyal Aharoni, August 13, 2017
Read More >
Cyber-attacks are making cyberspace an increasingly hostile environment for organizations. Despite having security solutions in place, defending against breaches is becoming more and more difficult, as recent cyber-attacks such as WannaCry have shown. Organizations are investing heavily in cybersecurity, and will invest even more in the coming years. IDC predicts that worldwide revenues for security-related hardware, software and services will grow from $73.7b a year in 2016 to $100b by 2020, a.
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag