Blog

Breach Trends & Insights – February 2021

This report summarises the top breaches between mid – January till 24th February 2021.  The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends.  Most common data breach trends identified –  Exposed Databases Ransomware Attacks Social Engineering Attacks Cyber Intrusions and… Read More »Breach Trends & Insights – February 2021

All You Need To Know About Attack Surface Management – And How To Defend It

What Is Attack Surface management (ASM)? If you were to imagine a scenario where you have just been hacked, what are the fastest routes a cyber-attacker could use to reach your core infrastructure or information? The chances are, you don’t know. Irrespective of how your network is designed, your actual connectivity and change of information… Read More »All You Need To Know About Attack Surface Management – And How To Defend It

How You Can Effectively Run Cyber Drills with Red Teaming

Red Teaming & Continuous Automated Red Teaming (CART) For the past decade, there have been unprecedented cases of cyber-attacks that have resulted in the exposure of private information and other related damages. According to RiskBased, cyber-attacks exposed 4.1 billion records in the first six months of 2019; and Juniper Research estimates this number to rise… Read More »How You Can Effectively Run Cyber Drills with Red Teaming

CISO Platform Fireside Chat – Running A Cyber Security Drill For The US Government & Homeland Security

In our last Fireside chat episode with CISO Platform, a well-known author and cybersecurity professional, Dan Lohrmann, CSO and Chief Strategist at Security Mentor Inc, and Bikash Barai, Co-Founder of FireCompass, discussed a bunch of things on how to effectively run a cyber crisis drill with the US Government and tabletops for enterprise board members.… Read More »CISO Platform Fireside Chat – Running A Cyber Security Drill For The US Government & Homeland Security

Why offense is better than defense

Red Teaming: Why A Forward Offense Is The Best Defense

Cyber-attacks and data breaches have been the top threats to organizations for the past decade. According to studies, there is a cyber-attack every 39 seconds. Opportunistic cybercriminals scan the internet for vulnerable systems and motivated cybercriminals persistently scan a targeted organization for vulnerable entry points. And unless you continuously carry out a vulnerability assessment of… Read More »Red Teaming: Why A Forward Offense Is The Best Defense