Don't second guess. Go with experience.

Have you been hit? CyberDefenses can help.




Pattern Recognition

Pattern Recognition, Analysis and Profiling for Investigations and Threat Hunting

We’ve received a few questions about what we cover in our Pattern Recognition, Analysis and Profiling class. If you are a cyber investigator or analyst – or any role that requires you to extract meaningful information for threat hunting or investigative activities – understanding how to efficiently and effectively identify patterns in huge volumes of data and…

Read More
Photo by Helloquence on Unsplash

Expanding Your Election Security Knowledge

Election security is more than understanding the technology, which on its own can be complex and at times confusing; it also includes understanding how to do things securely at every step of the election process. Many of the concerns during the Midterm Elections were amplified by the atmosphere of uncertainty around potential threats, confusion over…

Read More
Questions to Raise Cybersecurity Awareness

Keeping Election Security News In Perspective

Very few would argue that recent headlines concerning election security haven’t been alarming. From hacking to voting systems to stolen voter registration data and the deliberate distribution of false candidate information, it’s no wonder people are questioning the integrity of election results. It’s hard to know who or what to believe, and while there is…

Read More
Incident Response Plan

Incident Response Planning: Facing the Nightmare to Avoid Real-Life Horror

It’s Halloween, a time to turn our attention to the things that terrify us. In honor of this tradition, consider this creepy scenario: Lifeless eyes dilate at your approach. Battery-operated lungs suck in stale air, hypnotically wheezing with inhuman rhythm. A plastic chest rises and falls. The smooth skin reminds you of your own, only…

Read More
Man checking cyber security on laptop

What is a Firewall and Why Do You Need One?

You may have heard of firewalls and how they are an essential part of your computer and network cybersecurity strategy. In this post, we describe what a firewall is, why they are essential for cybersecurity, and how to set up and maintain your firewall security system. What is a Firewall? A firewall is a device…

Read More

Election Security: Detection and Response

One if by Land, Two if by Sea…Three if by Cyber? What would’ve happened if on that fateful night of Paul Revere’s Ride no one saw the lanterns, or if the watchers completely missed the movement of the British troops? While our Nation’s federal and local officials balance providing insights on cyberthreat activities while assuring…

Read More

The Election Security Conversation: Hype or Headlines?

You’ve likely seen the media coverage describing the current state of election security, and if you only read the headlines the news isn’t good. From coverage of teenagers hacking election databases in ten minutes at DefCon Voting Village  to hackers’ ability to easily manipulate votes on voting machines, the headlines paint a bleak picture. On…

Read More
Elections Cybersecurity Protects Voter Choice

7 Rules of Cybersecurity Threat Hunting

by Monty St John Threat hunting can and should be a part of your cybersecurity efforts, but the idea of starting a threat hunting and monitoring program can be intimidating. Building a portfolio of threats to watch and determining how to manage the risks they pose to your organization is usually confusing, often misleading and…

Read More
CyberDefenses - Defenses Protection

Your Incident Response Plan Depends on Knowing Your Attack Vectors

by Brian Engle, CISO Similar to businesses, attackers have goals that they set out to achieve. Depending on the attacker, the goals may vary, but ultimately to accomplish objectives an attacker has to utilize an attack vector to break through defenses. Network defenses and cybersecurity protections are the starting point for closing up potential attack…

Read More

DefCon’s Voting Village: Results and Impact

  by Monty St John It’s been a few weeks since DefCon took place in Las Vegas, but the buzz from this year’s event can still be heard echoing throughout cybersecurity circles, particularly elections cybersecurity. Hackers were out in full force to try their hand at breaking into election machines through DefCon’s “Voting Village” this…

Read More

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.