blog_hero_02

Blog

4 Steps for Getting a Handle on Your Organization's Security Posture as a New CISO
Dor Sarig, March 21, 2019
Read More >
You just signed on as CISO. Congratulations. Now you can expect to be deluged with security emergencies and unresolved issues from your predecessor while you're getting to know and building credibility with your team. Meanwhile, cyberattackers are still pounding at the door. All of these immediate pressures are important, but optimizing organization-wide security is why you were hired. Here are four steps that will help you identify security priorities and appropriate remediation steps, so you.
Read More >
Seeing the Unseen: Detecting and Preventing the Advanced Persistent Threat
Eyal Aharoni, January 31, 2019
Read More >
In the last few years, APT attacks conducted by individual cybercriminals, organized crime and state-sponsored groups have become prevalent and sophisticated, bypassing standard security controls such as APT, or Advanced Persistent Threat, is a sophisticated attack in which a person or group attains access to a network and remains undetected for an extended period of time.   The DarkHydrus APT Attack Let’s have a closer look at how APT threat actors operate by looking at a recent APT attack,.
Read More >
The Top Cybersecurity Trends from 2018 and Predictions for 2019
Eyal Wachsman, November 19, 2018
Read More >
As this year is coming to a close, we look back at the year in review. In 2018, cybercriminals succeeded to carry out a larger number of cyberattacks and data breaches than any previous year.   The 6 Big Cyber Trends of 2018: Trend #1 – Email Attacks Remain Popular Trend #2 – Cryptojacking and Crypto Hijacking Trend #3 – Zero-Day and Fileless Attacks Trend #4 – Ransomware Keeps Paying Off Trend #5 – Verticals and Industries Remain Prime Targets Trend #6 – Law, Crime, and Punishment   In this.
Read More >
Unpatched vulnerabilities provide an open door for Cybercrooks
Eyal Aharoni, June 12, 2018
Read More >
Knock knock, whose there? A Cybercrook is exploiting known vulnerabilities to penetrate the organization for an easy picking. The 2018 Open Source Security and Risk Analysis report released by Black Duck Software (a developer of auditing software for open-source security) shows, that the patching of vulnerabilities still leaves much to be desired. The research found that 78% of the codebases examined contained at least one unpatched vulnerability, and an average of 64 known exploits per.
Read More >
SOX Compliance Now Includes Cybersecurity
Eyal Aharoni, November 16, 2017
Read More >
SOX Compliance Includes Cybersecurity - Let Cymulate Help You To Navigate The Waters The Sarbanes-Oxley Act (known as SOX) went into effect in 2002 to protect shareholders and the general public from accounting errors and fraudulent practices of organizations. It was also tailored to improve the accuracy of corporate disclosures. SOX was drafted to improve corporate governance and accountability following a number of financial scandals that occurred at Enron, WorldCom, and Tyco as shown below.
Read More >
Cyberattacks Are Evolving, and So Does Cybersecurity Technology
Eyal Aharoni, October 27, 2017
Read More >
Organizations of all shapes and sizes are fighting the war against cyberattackers. As we have seen in recent years, cyberattacks are becoming more and more sophisticated, which makes it harder to detect and mitigate them. As cyberattacks evolve, so does security technology and the security assessment methodologies used to detect and fight these attacks. For over a decade, the main methods that organizations were using to verify that their infrastructure and data were secured, consisted of .
Read More >
How to Approach the Demanding 23 NYCRR 500 Regulation
Eyal Aharoni, October 9, 2017
Read More >
In March 2017, the New York State Department of Financial Services (NYDFS) issued a new regulation, the much discussed 23 NYCRR part 500. Considered to be one of the harshest cybersecurity regulations ever to impact companies, it consists of a new set of standards and requirements for banks, insurance companies, and other financial services organizations. It means that all businesses licensed by the New York DFS and "operating under or required to operate under a license, registration, charter,.
Read More >
How Cymulate Assists With ISO 27001 Certification and Compliance
Eyal Aharoni, September 18, 2017
Read More >
The ISO/IEC 27000 family of standards was developed to help organizations with keeping their information assets secure. Of all the ISO 27000 standards, ISO 27001 is the best-known. It is a specification for an information security management system (ISMS), which is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organization’s information risk management processes. As ISO points out, ISO 27001 was developed to "provide a model for.
Read More >
Cymulate Can Help You Comply With GDPR
Eyal Aharoni, August 31, 2017
Read More >
On May 25, 2018, the EU General Data Protection Regulation will come into force. It is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. As the examples in the table show, no organization is safe and the results of such a breach should not be underestimated. Date Victim Breach Fallout 2015 - 2017 Swedish Transport Agency The handling of.
Read More >
Helping Healthcare Providers To Keep Their Data HIPAA Compliant
Eyal Aharoni, August 21, 2017
Read More >
During the first half of 2017, cybercrooks were at it again. According to the U.S. Department of Health and Human Services, the sad balance stands at 149 breaches affecting a total of nearly 2.7 million individuals. The 5 Largest US Health Data Breaches in H1, 2017 Entity # Individuals Affected Breach Type Commonwealth Health 697,800 Theft by former employee Airway Oxygen 500,000 Hacker / Ransomware Urology Austin 279,663 Hacker / Ransomware Harrisburg Gastroenterology 93,323 Hacker
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag