Pre-Breach Mistakes Organizations Make With Cyber Security

Join us for the third installment of our series, 5 Most Common Pre-Breach Mistakes Organizations make with Cyber Security. Last time we talked about Mistake Two: Poor Use of Outside Assesors. Today we’re discussing the third mistake, talking up your cyber security, and not putting those talking points into action. Third Mistake: Touting Information Security […]

How to Properly Respond to a Cybersecurity Incident

Burlington Electric made headlines when The Washington Post reported that malware had compromised its systems and the Russians had hacked into the power grid. The incident as reported was false; it turns out that the utility had detected malware on a single laptop that was separate from its power systems and no breach had occurred. This […]

6 Must-Read Cybersecurity Articles, January 2016

Here are the must-read Cybersecurity, Infosec, and Identity Management articles from January 1 – 13, 2016. You can sign up for our biweekly newsletter here.   Researchers Out Default Passwords Packaged With ICS/SCADA Wares Information was gathered on more than 100 products using default passwords such as “admin.admin,” “password,” “root,” and “administrator,” found in the open passwords lists and vendor documentation. […]