
Executive Profile
Cybersecurity, Coronavirus, and the Joys of Giving Back
Today we sit down with our Founder & CEO, Marc Castejon, to discuss his own professional journey, the current state of cybersecurity, and everything in between.
Stay updated with all the latest news and announcements
Executive Profile
Today we sit down with our Founder & CEO, Marc Castejon, to discuss his own professional journey, the current state of cybersecurity, and everything in between.
The Ponemon Institute
Every CISO faces the unique challenge of justifying a budget whose ROI is predominantly measured by what never happened.
Cybersecurity During a Global Crisis
The most vulnerable sector to cybersecurity attacks isn't Wall Street, the military, or even Silicon Valley. It's our healthcare system.
read more
Cybersecurity Trends
The WHO has labeled COVID-19 a global pandemic, setting off a wave of sweeping measures that have impacted not
only our physical lives, but our digital lives as well.
read more
The Ultimate Challenge
Following a wave of devastating breaches, many firms are looking for better strategies to manage cybersecurity risks. One highly effective exercise is the PenTest.
Cybersecurity Trends
At long last, the World Economic Forum has finally come to recognize cybersecurity as the "second most concerning risk for doing business globally over the
next 10 years," signaling a growing recognition within the business community of the importance of their CISOs and the challenges they face.
read more
It's official
Airports are (in)famous for their lengthy physical security checks, but how do they rank in terms of cybersecurity? A team of security researchers recently set out
to find out once and for all by assessing the current state of cybersecurity at the world's 100 largest airports. Here's what they found: read more
A Guide to Ransomware Payments
It's no secret that 2019 was in many ways the Year of Data Breaches. While many cybercriminals steal data in order to mount further attacks or to sell it on the Dark Web, ransomware
attackers are unique in that they make a simple offer: pay a ransom and everything will go back to normal.
read more
Four Lessons from FIC 2020
The theme of FIC 2020 was Putting Humans at the Heart of Cybersecurity, so it's no surprise that social hacking
remained a hot button topic throughout the three-day conference. read more
Cybersecurity Trends
The World Economic Forum just released their 2020 Global Risk Report, a compilation of research conducted by global risk consultants and financial analysts
defining the major business risks facing the markets in both the short and long term. read more
Cybersecurity Trends
While encryption technologies, systems, and standards have become incredibly secure over the past decade, it has become increasingly clear that the the largest cybersecurity threat to nearly any organization is its people. ...
Cybersecurity for IoT
You know that you've done something truly wrong when your cybersecurity scandal makes this year's mega-breaches (affecting everyone from Facebook to Equifax) seem
quaint.
read more
Happy New Year's
As 2019 winds down, we've decided to dig through the Silent Breach archives and review the numerous challenges, lessons, and solutions that this year has presented.
What we've come up with is a list of the top five cybersecurity resolutions to make 2020 a cyber-success!
...
From Caesar to Honeypots
90% of the world's data was generated in the last two years. To keep pace with this massive proliferation of data creation and transmission, cryptographers have
been working overtime to engineer increasingly complex encryption techniques.
The Cybersecurity Mindset
Myth 1: Everyone is accountable for cybersecurity.
We often hear things like "Everyone is accountable for security." This is false. While everyone is responsible
for cyber security, only a select few are ultimately accountable.
read more
Expect the unexpected
What is a business continuity plan?
Although Business Continuity Plans should be specially tailored (in consultation with your cybersecurity partner) to your organization's needs and abilities, most IT BCPs should include the following 3 sections:
...
Are our governments prepared?
The State of Mississippi completed its first governmentwide cybersecurity audit this month. The results were less than encouraging.
read more
Can they work together?
In the wave of large-scale cybersecurity breaches sweeping the country, there is one sector which is barely reported on, and yet represents possibly the most
pressing technological threat to human life.
...
The California Consumer Protection Act
The California Consumer Protection Act (CCPA) is designed to enhance data privacy rights and consumer protections for the
citizens of California and comes into effect on January 1, 2020. Although it's been over 2 years since the bill has been
ratified, many companies are still not sure if and how they will be affected.
Silent Breach in the press
announcement
Silent Breach in the press
© Copyright Silent Breach. All Rights Reserved.