Our Blog

Stay updated with all the latest news and announcements

pic52

The Ultimate Challenge

What is Penetration Testing?

Following a wave of devastating breaches, many firms are looking for better strategies to manage cybersecurity risks. One highly effective exercise is the PenTest.

read more



pic49

A Guide to Ransomware Payments

To Pay or Not to Pay

It's no secret that 2019 was in many ways the Year of Data Breaches. While many cybercriminals steal data in order to mount further attacks or to sell it on the Dark Web, ransomware attackers are unique in that they make a simple offer: pay a ransom and everything will go back to normal.       

read more



pic47

Cybersecurity Trends

WEF: Major Risk of Cyberattack in 2020

The World Economic Forum just released their 2020 Global Risk Report, a compilation of research conducted by global risk consultants and financial analysts defining the major business risks facing the markets in both the short and long term.          

read more



pic46

Cybersecurity Trends

Social Engineering is on the Rise

While encryption technologies, systems, and standards have become incredibly secure over the past decade, it has become increasingly clear that the the largest cybersecurity threat to nearly any organization is its people.                          ...

read more



pic44

Happy New Year's

5 Cybersecurity Resolutions for 2020

As 2019 winds down, we've decided to dig through the Silent Breach archives and review the numerous challenges, lessons, and solutions that this year has presented. What we've come up with is a list of the top five cybersecurity resolutions to make 2020 a cyber-success!              
 
...

read more



pic43

From Caesar to Honeypots

A Brief History of Cryptography

90% of the world's data was generated in the last two years. To keep pace with this massive proliferation of data creation and transmission, cryptographers have been working overtime to engineer increasingly complex encryption techniques.         

read more



pic42

The Cybersecurity Mindset

Top Four Security Myths

Myth 1: Everyone is accountable for cybersecurity.        
We often hear things like "Everyone is accountable for security." This is false. While everyone is responsible for cyber security, only a select few are ultimately accountable.

read more



pic40

Are our governments prepared?

The Politics of Cybersecurity

The State of Mississippi completed its first governmentwide cybersecurity audit this month. The results were less than encouraging.
                                        

read more



pic39

Can they work together?

Cybersecurity and Healthcare

In the wave of large-scale cybersecurity breaches sweeping the country, there is one sector which is barely reported on, and yet represents possibly the most pressing technological threat to human life.
                    
...

read more



pic38

The California Consumer Protection Act

A Brief Guide to CCPA

The California Consumer Protection Act (CCPA) is designed to enhance data privacy rights and consumer protections for the citizens of California and comes into effect on January 1, 2020. Although it's been over 2 years since the bill has been ratified, many companies are still not sure if and how they will be affected.  

read more



pic37

3 Takeaways from the Ecuador Breach

Julian Assange Gets a Taste of His Own Medicine

Earlier this week, residents of Ecuador woke up to the news that much of their personal data, including banking details, employment information, and identification numbers, had been made publicly available by a small online consulting firm.
       

read more



pic36

What Facebook keeps getting wrong

The Culture of Cybersecurity

Yet another 419 million Facebook accounts have been breached. Add this to the 100s of millions already compromised in the Cambridge Analytica, UpGuard, and 'View As' scandals, and the question becomes: can Facebook ever be secure?            

read more



pic35

Continuous Monitoring

The Latest in Cybersecurity Trends

Here's a fact: On average, it takes companies nearly half a year to identify a cyber security breach. 
Here's another fact: Research shows that breaches that take over 30 days to contain cost an average of $1 million more than those contained within the first month.
...

read more



pic34

Lessons from Black Hat 2019 and Def Con 27

The Myth of Cyber Security

Riddle: What do Marriott, Equifax, and Capital One all have in common?
Answer: They've each been the victim of a data breach compromising 100 million+ users each; all in the past 12 months.                 

read more



Load More