Crime Does Pay

Well, at least cybercrime does. In fact, it turns out that it pays well. Bromium published a report in 2018 in which it asserted: “High-earning cyber criminals can make $166,000+ per month; Middle-earners can make $75,000+ per month; Low-earners can make $3,500+ per month.” That is serious money for the high and middle earners. For

Dark Web? We don’t need no stinking Dark Web…

Wait what? Need the Dark Web? What are you talking about? The truth is so much information about you is already available in all the places where it’s supposed to be secure. Imagine for a second that your personal information only existed in the Dark Web.  Ironically, it might really be less accessible – well

Apathy: CyberSecurity’s biggest HURDLE

WE ARE COMFORTABLY NUMB, AND THE DATA AGGREGATORS KNOW IT…. Who knew Pink Floyd’s classic rock hit could be the theme song to the current state of data breaches.  Given the lack of any lasting public outrage for data breaches and leaks of personal data, I find myself wondering if the masses really care?  Meaning,

Cybersecurity Starts at the Top

  A majority of an organization’s information is now stored and transferred in digital form creating an extremely urgent need for them to secure their data. The integrity of this digital information is constantly being challenged by attacks aimed at stealing, exposing or manipulating it. This hostile environment affects all industries, from healthcare to finance

Next-Gen Malware Will Own You

Imagine a ransomware that can get past your endpoint protection, disable Windows Defender, shutdown the host firewall, connect to USB drives, disables access to various executables, encrypts your files and plants its own master boot record and its own boot loader. Not cool, right? How about if it were done just for kicks? Some ransomware

Dangerous SAML SSO vulnerability?

Several sources have recently reported the discovery of a ‘flaw’ in certain SAML implementations that could allow a ‘bad actor’ to alter the identity carried in a Single Sign-On SAML assertion and legitimately log in as a different user as reported by TechTarget. Wow – that’s bad!  That was my initial reaction, and I envisioned

The Importance of Analytics to Cybersecurity

In part 5 of 6 Vlogs, CTI’s Director of Cybersecurity, Ben Thurston makes the connection between cybersecurity monitoring and analytics. Ben explains the importance of analytics in gathering data and information from multiple security sources to provide insight into what is going on from a security/risk posture. Security analytics, like the CTI CustomerUniverse, collects information

A Multi-layered Approach to Securing Data Assets

In this 3rd of 6 Vblogs, CTI’s Ben Thurston explains to Mark Janowicz that there is no one cybersecurity solution that will solve all problems when it comes to data security.  The best approach, Ben explains is a multi-layered one. The data that is owned by your marketing team contains a lot of important and

Why Equifax Type Breaches Will Continue

Cybersecurity, cyber lessons, data security

Lessons Not Learned from Target – Why Equifax Type Breaches Will Continue. It’s hard to believe the massive data breach at Target that cost their CEO and CIO their jobs occurred almost four years ago. It was a very high-profile data breach that should have put all C-suite executives on notice that if you fail

The Cause of the Equifax Breach: Why Being Right Still Feels Lousy

I recently wrote a blog about my thoughts on the Equifax breach and predicted that, once the cause of the breach was revealed, it would be attributed to human error and could have been completely preventable.  As it turns out, I was right.  While perusing one of my favorites IT websites, The Register, I came