Beyond media sensationalism and corporate marketing, what are the actual differences between Signal, Telegram, and WhatsApp? Here's our app-by-app breakdown and ranking.
Stay updated with all the latest news and announcements
197. That's how many days it takes an average company to detect a security breach. Hackers have over 6 months before their victim is even aware
that they've been hacked.
Never Trust, Always Verify
Chris Krebs, the former Director of CISA, was fired on November 17th after repeatedly affirming that the
2020 election was the "most secure in American history."
2020 Space and Cybersecurity Symposium
As NASA struggles to fend off a fresh wave of cyber-attacks, the US Space Force is quickly ramping up its cybersecurity capabilities to counter foreign interference.
Lessons from COVID-19
While globalization has created economic and political opportunities for many, it is also responsible for the rapid spread and destruction created by COVID-19.
Today we sit down with our Founder & CEO, Marc Castejon, to discuss his own professional journey, the current state of cybersecurity, and everything in between.
At long last, the World Economic Forum has finally come to recognize cybersecurity as the "second most concerning risk for doing business globally over the
next 10 years," signaling a growing recognition within the business community of the importance of their CISOs and the challenges they face.
Airports are (in)famous for their lengthy physical security checks, but how do they rank in terms of cybersecurity? A team of security researchers recently set out
to find out once and for all by assessing the current state of cybersecurity at the world's 100 largest airports. Here's what they found:
A Guide to Ransomware Payments
It's no secret that 2019 was in many ways the Year of Data Breaches. While many cybercriminals steal data in order to mount further attacks or to sell it on the Dark Web, ransomware
attackers are unique in that they make a simple offer: pay a ransom and everything will go back to normal.
Four Lessons from FIC 2020
The World Economic Forum just released their 2020 Global Risk Report, a compilation of research conducted by global risk consultants and financial analysts
defining the major business risks facing the markets in both the short and long term.
Happy New Year's
As 2019 winds down, we've decided to dig through the Silent Breach archives and review the numerous challenges, lessons, and solutions that this year has presented.
What we've come up with is a list of the top five cybersecurity resolutions to make 2020 a cyber-success!
From Caesar to Honeypots
90% of the world's data was generated in the last two years. To keep pace with this massive proliferation of data creation and transmission, cryptographers have
been working overtime to engineer increasingly complex encryption techniques.
Expect the unexpected
What is a business continuity plan?
Although Business Continuity Plans should be specially tailored (in consultation with your cybersecurity partner) to your organization's needs and abilities, most IT BCPs should include the following 3 sections: ...
The California Consumer Protection Act
The California Consumer Protection Act (CCPA) is designed to enhance data privacy rights and consumer protections for the
citizens of California and comes into effect on January 1, 2020. Although it's been over 2 years since the bill has been
ratified, many companies are still not sure if and how they will be affected.
3 Takeaways from the Ecuador Breach
Earlier this week, residents of Ecuador woke up to the news that much of their personal data, including banking details, employment information, and identification
numbers, had been made publicly available by a small online consulting firm.
What Facebook keeps getting wrong
Yet another 419 million Facebook accounts have been breached. Add this to the 100s of millions already compromised in the Cambridge Analytica, UpGuard, and 'View As' scandals, and the question becomes: can Facebook ever be secure?
Here's a fact: On average, it takes companies nearly half a year to identify a cyber security breach.
Here's another fact: Research shows that breaches that take over 30 days to contain cost an average of $1 million more than those contained within the first month.
5 Important Steps to Help Your Business Respond Quickly and Safely
Unfortunately, successful cyberattacks are growing far too common. A 2018 study found that nearly 70% of SMBs have experienced a cyberattack in the past year, yet an astounding 47% of respondents said they "have no understanding" of how to protect themselves ...
A CISO Playbook for Engaging C-suite Executives
It has become somewhat cliché to say that cybersecurity is no longer exclusively an IT job, but needs to be a company-wide effort. But the reality is that CISOs are both the newest C-level executives and the least understood. According to ...
According to recent reports, Managed Security Service expenditures are set to double to nearly $50 billion by 2023.
3 Takeaways from Tim Cook's Stanford Graduation Speech
In his now (in)famous speech, Tim Cook used the Stanford graduation ceremony last weekend to warn the young grads (and the world) about his concerns regarding the direction tech firms have been taking. While hailing the industry for its successes - from HP to the iPhone - Cook pulled no punches when discussing the chaos that they've created. Here are 3 takeaways from Cook's remarks:
How cybersecurity is changing the way we value financial assets
With seemingly daily reports of massive data breaches, cybersecurity remains one of the highest risks facing firms and their clients. But none of this is news. Instead, in this article I'll be taking a close-up look at some of the quantifiable effects that security breaches have had on asset market values. Here's a roundup of some of the more infamous cases in recent news:
Where Y Combinator Went Wrong
In 2016, a young sales intelligence firm, Apollo, emerged from Y Combinator against a backdrop of flashy PR and projected growth. Reveling in their nascent celebrity, Apollo went so far as to boast on their homepage that "no one ever drowned from revenue." But it was not revenue that they drowned in when, late last summer, Apollo's databases were hacked, releasing 212 million contact listings, con...
Cybersecurity for Web Design Agencies
By now we've all heard the news. Car rental behemoth, Hertz, is suing Accenture for $32 million for their failure to deliver "viable web and mobile applications". In fact, Hertz claims that the project needed to be "scrapped" entirely due to "serious security vulnerabilities and performance p...
What to look out for
If you've ever been in a meeting at a startup when the topic of cybersecurity came up, then you've probably seen the barely concealed eye-rolls, feigned attention, and predictable inaction. The reason for this is often simple: startups just don't see themselves as viable targets and are already under immense financial strain. Far more focused on "lean" development, marketing and financials, startu...
According to a recent World Economic Forum report, business executives in both North America and APAC consider cyber-attacks to be the number one risk of doing business, outranking terror attacks and asset bubbles. To prepare, here are our projected Top 5 Cyber-Attack Ve...
Top 5 tips to help you find the firm that will serve you best
With the cost of cybercrime set to top $5 trillion over the next five years, an incredible number of cybersecurity firms have been founded in the last few years. So, how do you sift through these countless listings and pick out the perf...
Interview with Bill Aulet, MIT's Director of Entrepreneurship
Bill Aulet is an entrepreneur, educator, speaker, and author of the best-selling Disciplined Entrepreneurship. Since 2009, he has served as the managing director of the Martin Trust Center for MIT Entrepreneurship as well as a senior lecturer at the MIT Sloan School of Management. ...
Silent Breach article in Silicon Luxembourg
Marc Castejon is the CEO and Founder of Silent Breach, a cybersecurity startup that specializes in network security and digital asset protection. With over 20 years of experience in the US retail market, Marc and his team have recently developed a software product to help retailers proactively protect their businesses. (Image Credit: Marc Castejon, CEO and Founder of Silent Breach / Image Credit ...
Silent Breach is very honored to be part of the top 10 cyber security solutions for 2018 in the retail sector. The original article is available here: https://retail-security.retailciooutlook.com/vendors/top-retail-security-solution-providers-2018.html Solution described in this ar...
Silent Breach nominated again as best solution provider
Silent Breach is honored to be certified as "20 Best Security Solution Providers of 2018" by Industry Era Magazine The original article is available here: https://www.industry-era.com/vendor-2018-security-Continuous-Protection.php Solution described in this article: read more...
Nominated cyber security solution
Retail CIO Outlook magazine has published a great article on Silent Breach Read the full article here....
Top 5 tips from pentesters
The recent explosion of webapps has led to a dramatic rise in cyber attacks specifically targeting vulnerabilities in web applications. Three quarters of the web applications tested by Silent Breach presented high or critical vulnerabilities that could have led to a data breach, or even total compromise of the website: Fortunately, the ...
Silent Breach provides cyber security training
Silent Breach training expert Hristiyan Lazarov representing the Luxembourg House of Training in Pristina, Kosovo gave a lecture on "Cyber and Information Security Management" to the Kosovo Banking Association. This 3 day training session gave the assosiation an overview of the most common cyber security tactics used in the finance industry today, as well as an insight into trends in the security ...
Silent Breach announcement
AT&T Bug Bounty Program
The Silent Breach cyber security research team has reached the top 25 AT&T bug hunters for Q2 2018:
AT&T Hall of Fame available here: https://bugbounty.att.com/hof.php, for more information on Silent Breach...
Intel vulnerability: self XSS attack
Silent Breach uncovered a vulnerability on Intel's server, which has been addressed by their internal security team. This self XSS attack allowed hackers to gather information on a user that could be used in social engineering attacks. Here's a screenshot below:
XSS found on iTunes servers
Are you ready for GDPR?
The European Parliament adopted The General Data Protection Regulation GDPR in April 2016, replacing an outdated data protection directive from 1995. It carries provisions that require businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU ...
Happy new year 2018!
There is no doubt that 2017 has been a bad year for cyber security, with the Equifax breach, Wannacry ransomeware, Russian social media manipulation, etc... But to get you ready for 2018, here's our top 8 cyber-security recommendations to survive through this new year:
New vulnerability uncovered
Silent Breach finds a vulnerability with the online Wikipedia web site and in its free open source MediaWiki platform:
This vulnerability allows an attacker to gather information on the target (Wikipedia.org) and more easily narrow down potential breaches in the modules used by this web site. This kind of vulnerability is commonly referred to as Information Exposure Through Sent Data ...
Full comission positions
Silent Breach is recruiting full commission regional sales managers, in the retail, automotive and IoT industry. Please send CV/resumes to firstname.lastname@example.org for immediate consideration!...
New vulnerabiltiy found
Silent Breach uncovers another 0-day breach as reported by the exploitdb web site:
Silent Breach in the press
Silent Breach Nominations
Silent Breach Nominations
Silent Breach in the press
© Copyright Silent Breach. All Rights Reserved.