Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Applying the Churchill Knowledge Audit to Cybersecurity

When FedEx founder Fred Smith attended Yale in the mid-1960s, he wrote an economics paper describing the concept of overnight delivery of packages by air. His professor infamously gave him a “C” grade because he viewed it as implausible. But Smith knew something his professor didn’t—and it was an idea that would change the way the business world worked forever. I bring this story up for two reasons. For one thing, I worked for FedEx and learned a lot from my time there.

When Hackers Get Hacked: A Cybersecurity Triumph

In a dramatic twist befitting a digital thriller, a malware analyst at SecurityScorecard turned the tables on cybercriminals, rescuing a company from a staggering $500,000 ransomware demand. This story isn’t just about a single incident; it’s a testament to the power of cybersecurity expertise in the ongoing battle against ransomware, a menace that recorded 493 million instances in 2022 alone.

CRQ Journey Part 2: The Importance of Unbiased Data in Financial CRQ

During my first few years as a CISO at Avid Technology, I was able to install a robust cybersecurity program. (Avid is a software provider that equips digital content creators with innovative tools.) With the help of my security team, Avid had become more mature in their control measures. This maturity meant we were better armed to address cyber vulnerabilities. ‍ Unfortunately, on top of my regular duties, I also had to face an even greater challenge.

SLP Denial of Service Amplification - Attacks are ongoing and rising

The Service Location Protocol (SLP), as defined in the RFCs, is vulnerable to abuse allowing attackers to use it as a powerful reflective denial-of-service amplification vector. Earlier this year, Bitsight and Curesec published a joint research regarding this flaw tracked as CVE-2023-29552, which details the issue as well as its global impact and exposure.

The Rise of Automotive Hacking

The automotive industry stands at the crossroads of innovation and vulnerability. As cars become increasingly connected, with advanced systems and features that rely on intricate software, the rise of automotive hacking has become a pressing concern. The convergence of traditional mechanical engineering and cutting-edge software has given rise to a new breed of threats that extend beyond physical security, delving into the digital realm of vehicle control systems.

Securing Your Supply Chain: Risk Management vs Security Management

Supply chain management has become a top priority for businesses due to the increasing use of digital technologies and geopolitical uncertainties, making global supply chains more vulnerable than ever to disruptions. This reality highlights two critical aspects of supply chain management: Supply Chain Risk Management (SCRM) and Supply Chain Security Management (SCSM).

Understanding Software Licensing Agreements

The great Yogi Berra is often quoted as having said "in theory, there is no difference between practice and theory. In practice, there is." Perhaps the same can be said about software licensing agreements. There are often two dimensions to any software license agreement: what’s in the agreement and how the commercial relationship is implemented in practice.

Global Cyber Threats: Insights and Strategies for Defense

In an era where digital connectivity spans across borders, understanding and countering global cyber threats has become a paramount concern for businesses, governments, and individuals alike. This blog post delves into the prevailing global cyber threat trends and outlines effective strategies to defend against these evolving challenges.

Strengthening the Shield

The role of governments has evolved to include the safeguarding of not just physical borders but also virtual territories. With an increasing reliance on technology, the need for robust cybersecurity measures within government entities has never been more critical. Here we’ll explore cybersecurity best practices that can fortify government systems, ensuring the protection of sensitive information and the preservation of national security.