
The Ultimate Challenge
What is Penetration Testing?
Following a wave of devastating breaches, many firms are looking for better strategies to manage cybersecurity risks. One highly effective exercise is the PenTest.
Stay updated with all the latest news and announcements
The Ultimate Challenge
Following a wave of devastating breaches, many firms are looking for better strategies to manage cybersecurity risks. One highly effective exercise is the PenTest.
Cybersecurity Trends
At long last, the World Economic Forum has finally come to recognize cybersecurity as the "second most concerning risk for doing business globally over the
next 10 years," signaling a growing recognition within the business community of the importance of their CISOs and the challenges they face.
read more
It's official
Airports are (in)famous for their lengthy physical security checks, but how do they rank in terms of cybersecurity? A team of security researchers recently set out
to find out once and for all by assessing the current state of cybersecurity at the world's 100 largest airports. Here's what they found: read more
A Guide to Ransomware Payments
It's no secret that 2019 was in many ways the Year of Data Breaches. While many cybercriminals steal data in order to mount further attacks or to sell it on the Dark Web, ransomware
attackers are unique in that they make a simple offer: pay a ransom and everything will go back to normal.
read more
Four Lessons from FIC 2020
The theme of FIC 2020 was Putting Humans at the Heart of Cybersecurity, so it's no surprise that social hacking
remained a hot button topic throughout the three-day conference. read more
Cybersecurity Trends
The World Economic Forum just released their 2020 Global Risk Report, a compilation of research conducted by global risk consultants and financial analysts
defining the major business risks facing the markets in both the short and long term. read more
Cybersecurity Trends
While encryption technologies, systems, and standards have become incredibly secure over the past decade, it has become increasingly clear that the the largest cybersecurity threat to nearly any organization is its people. ...
Cybersecurity for IoT
You know that you've done something truly wrong when your cybersecurity scandal makes this year's mega-breaches (affecting everyone from Facebook to Equifax) seem
quaint.
read more
Happy New Year's
As 2019 winds down, we've decided to dig through the Silent Breach archives and review the numerous challenges, lessons, and solutions that this year has presented.
What we've come up with is a list of the top five cybersecurity resolutions to make 2020 a cyber-success!
...
From Caesar to Honeypots
90% of the world's data was generated in the last two years. To keep pace with this massive proliferation of data creation and transmission, cryptographers have
been working overtime to engineer increasingly complex encryption techniques.
The Cybersecurity Mindset
Myth 1: Everyone is accountable for cybersecurity.
We often hear things like "Everyone is accountable for security." This is false. While everyone is responsible
for cyber security, only a select few are ultimately accountable.
read more
Expect the unexpected
What is a business continuity plan?
Although Business Continuity Plans should be specially tailored (in consultation with your cybersecurity partner) to your organization's needs and abilities, most IT BCPs should include the following 3 sections:
...
Are our governments prepared?
The State of Mississippi completed its first governmentwide cybersecurity audit this month. The results were less than encouraging.
read more
Can they work together?
In the wave of large-scale cybersecurity breaches sweeping the country, there is one sector which is barely reported on, and yet represents possibly the most
pressing technological threat to human life.
...
The California Consumer Protection Act
The California Consumer Protection Act (CCPA) is designed to enhance data privacy rights and consumer protections for the
citizens of California and comes into effect on January 1, 2020. Although it's been over 2 years since the bill has been
ratified, many companies are still not sure if and how they will be affected.
3 Takeaways from the Ecuador Breach
Earlier this week, residents of Ecuador woke up to the news that much of their personal data, including banking details, employment information, and identification
numbers, had been made publicly available by a small online consulting firm.
What Facebook keeps getting wrong
Yet another 419 million Facebook accounts have been breached. Add this to the 100s of millions already compromised in the Cambridge Analytica, UpGuard, and 'View As' scandals, and the question becomes: can Facebook ever be secure?
Continuous Monitoring
Here's a fact: On average, it takes companies nearly half a year to identify a cyber security breach.
Here's another fact: Research shows that breaches that take over 30 days to contain cost an average of $1 million more than those contained within the first month.
...
Lessons from Black Hat 2019 and Def Con 27
Riddle: What do Marriott, Equifax, and Capital One all have in common?
Answer: They've each been the victim of a data breach compromising 100 million+ users each; all in the past 12 months.
read more
Silent Breach in the press
announcement
Silent Breach in the press
© Copyright Silent Breach. All Rights Reserved.