Search Results for: cybersecurity posture Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Blog Post Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It... Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... Blog Post Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Blog Post How to improve your organization’s security posture February 17, 2020 For an organization, any electronic or physical information is an asset and its security is exceptionally crucial. Information security is... Blog Post CISA: Defend Against COVID-19 Cyber Scams March 20, 2020 According to the post published by The Cybersecurity and Infrastructure Security Agency (CISA), people should remain vigilant for scams related... Blog Post Proofpoint and Microsoft Office 365 Fail in Latest COVID-19 Phishing Campaign April 2, 2020 Proofpoint and Microsoft Office 365 advanced threat protections (ATPs) are considered as top email protection though, an effective spoofing campaign... Page The Daily TRUTH – Temporary Remote Universal Threat Hunt March 12, 2020 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult... Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that... Blog Post What is Cybersecurity? February 26, 2020 Cybersecurity is the technology of protecting networks, devices, and data from unauthorized access or criminal use. In terms of Cybersecurity,... Knowledge Center LIFARS Cyber Resiliency Program September 4, 2019 Cyber Resilience and Response Subscription Program Time is of the essence when cyber-attacks happens. The LIFARS Cyber Resilience and Response... Page Short – Term Incident Response and Digital Forensics Retainer March 22, 2020 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult... Knowledge Center Incident Response Management Retainer July 29, 2019 Without a comprehensive Incident Response Strategy, your exposure to adversaries destroying your data, damaging your brand and dramatically impacting your... Knowledge Center Tabletop Exercises with LIFARS Incident Response Team September 4, 2019 A cyber attack can be devastating, often resulting in the loss of revenue, interrupted business continuity and significant damages to... Blog Post Zero Trust Security- Report 2019 March 27, 2020 In a time where network surveillance is ubiquitous, we find ourselves having a hard time knowing who to trust. Can...
Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across...
Blog Post Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It...
Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil...
Blog Post Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...
Blog Post How to improve your organization’s security posture February 17, 2020 For an organization, any electronic or physical information is an asset and its security is exceptionally crucial. Information security is...
Blog Post CISA: Defend Against COVID-19 Cyber Scams March 20, 2020 According to the post published by The Cybersecurity and Infrastructure Security Agency (CISA), people should remain vigilant for scams related...
Blog Post Proofpoint and Microsoft Office 365 Fail in Latest COVID-19 Phishing Campaign April 2, 2020 Proofpoint and Microsoft Office 365 advanced threat protections (ATPs) are considered as top email protection though, an effective spoofing campaign...
Page The Daily TRUTH – Temporary Remote Universal Threat Hunt March 12, 2020 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult...
Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that...
Blog Post What is Cybersecurity? February 26, 2020 Cybersecurity is the technology of protecting networks, devices, and data from unauthorized access or criminal use. In terms of Cybersecurity,...
Knowledge Center LIFARS Cyber Resiliency Program September 4, 2019 Cyber Resilience and Response Subscription Program Time is of the essence when cyber-attacks happens. The LIFARS Cyber Resilience and Response...
Page Short – Term Incident Response and Digital Forensics Retainer March 22, 2020 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult...
Knowledge Center Incident Response Management Retainer July 29, 2019 Without a comprehensive Incident Response Strategy, your exposure to adversaries destroying your data, damaging your brand and dramatically impacting your...
Knowledge Center Tabletop Exercises with LIFARS Incident Response Team September 4, 2019 A cyber attack can be devastating, often resulting in the loss of revenue, interrupted business continuity and significant damages to...
Blog Post Zero Trust Security- Report 2019 March 27, 2020 In a time where network surveillance is ubiquitous, we find ourselves having a hard time knowing who to trust. Can...