Don't second guess. Go with experience.

Blog

Categories

Archives

What Is Digital Forensics?

Cybersecurity includes a vast number of different components, aspects, techniques and disciplines. From cyber intelligence to continuous threat monitoring and risk assessments, the full spectrum of cybersecurity activities spans an extensive range. One discipline within this range is digital forensics, and like all of the other activities in the security world, fully understanding what it…

Read More

Securing the Cloud

The freedom of access – to anything, anytime and anywhere – is the strength and peril of the cloud.  While the cloud empowers accessibility, its ubiquitous nature can also undermine security.  The same avenues that give us access to information we want and need also open ways for hackers and malicious actors to reach us….

Read More

Legislation Alone Won’t Secure Elections. Action and Best Practices Will.

In recent weeks the federal and state governments have been pushing legislation forward in efforts to protect elections from cyberattack. For instance, bill US HR1, For the People Act of 2019, passed in the United States House of Representatives in March and is now being considered by the Senate. The bill includes the Election Security…

Read More

Training Can Have a Powerful Impact on Election Security

Cybersecurity attackers work pretty much like we all do – finding the easiest way to get the job done. You can have the most sophisticated security measures in place and use the most sophisticated technology, configured correctly and adherent to all regulations and policies, but if your team is not security-savvy, attackers will easily find…

Read More
Cybersecurity tactics to defend against cyberattack

Cybersecurity Tactics to Defend Against Cyberattack

Cybercrime continues to plague organizations resulting in compromised information, damaged reputations and expensive reparations. As cyberattacks grow in complexity, they are capable of attacking various forms of infrastructure using a wide range of tactics. In short, our dependence on technology makes cybersecurity a concern for all of us. Most of us, for personal or professional…

Read More
Factor in AI when working with SIEM.

Artificial Intelligence Is Only As Good As Our Input

Much of the intelligence and SIEM tools cybersecurity and IT pros use day in and day out have a machine learning component that falls into the category of Artificial Intelligence (AI). For example, it could be argued that the AlienVault Unified Security Management (USM) product, with SIEM capabilities, operates with some AI characteristics and capabilities….

Read More

What Is Cyber Intelligence?

In February 2002, Donald Rumsfeld, then US Secretary of State for Defense, stated at a briefing, “There are known knowns. There are things we know that we know. There are known unknowns. That is to say, there are things that we now know we don’t know. But there are also unknown unknowns. There are things…

Read More
2020 Election Security

2020 Election: URL Hijacking Could Be a Serious Issue

The Internet Is the Ideal Staging Ground for 2020 Election Attacks Good and bad news spreads at the speed of the Internet. People share thousands of posts on social media before fact checking can even start. And once disseminated, even false information requires an enormous effort to correct. And we may not even be able…

Read More
CyberDefenses - Open Padlock and Chain

What Is A Zero-Day Vulnerability and How Does it Work?

Understanding Zero-Day Vulnerability There’s no end to the numerous challenges involved in securing your networks, systems, and environment. Whether it’s ransomware, social engineering or data theft, the volume of cyber threats that impact IT assets, personal data, and business networks are staggering. This is especially the case with “zero-day vulnerabilities.” Because cybersecurity is reliant on…

Read More
Voter registration data on Darknet

The Truth Behind Voter Registration Data Found on the Darknet

Election security has been a heightened focus of concern since 2016 and the media is highlighting a range of activities that could indicate serious hacker activity as we head in the 2020 election. We’re worried about hacking voting systems and stolen voter registration data in addition to the deliberate distribution of false candidate information. The…

Read More

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.