My takeaways from last week – Sept 27, 2021

Each Monday I'm publishing a list of quick thoughts and top readings on cybersecurity from the previous week. Here is my take from the week of September 20th: An excellent article on advanced phishing: Hackers Are Going ‘Deep-Sea Phishing,’ So What Can You Do About It? "Hackers are upping their game, using an approach I …

Continue reading My takeaways from last week – Sept 27, 2021

How ransomware changed the face of cybersecurity

In a popularity contest for cyberattacks, Ransomware would definitely win and its (bad) reputation among the general public is well deserved. Ransomware is probably the type of attack that had the most significant influence on the cybersecurity industry in the last 10 years. Here is why. The Prevalence Compared to other classes of attacks - …

Continue reading How ransomware changed the face of cybersecurity

Security Architecture considerations for Cyber Resilience – why threat prevention is important

In an earlier blog this year, I compared the concepts of cybersecurity and cyber-resiliency, arguing that the main difference between the two is one of perspective. Cybersecurity is centered on the idea that attacks can (and should) be prevented while cyber-resilience acknowledges that some attacks will go through, and that organizations must prepare to deal …

Continue reading Security Architecture considerations for Cyber Resilience – why threat prevention is important

A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)

In the third and last part of the blog series on Practical Cyber Resilience, I will cover the Approaches, Tactics and Techniques that an organization should use when developing options for improving cyber resilience. In the previous blog, I detailed the practical five-step Cyber Resilience Analysis Process recommended both by NIST and MITRE for enhancing …

Continue reading A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)

A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I covered the four key characteristics (or guiding principles) of cyber resilience. In this blog we will review the main objectives and 5-step Cyber Resilience Analysis methodology, as defined by the NIST Special Publication 800-160, Developing Cyber Resilient Systems. Within …

Continue reading A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

Three takeaways for a Small Business from the Microsoft Exchange hack

I heard this so many times: “My company is too small to be the target of an advanced attack”. Unfortunately, this is not true and the recent cyber-attacks on Microsoft Exchange servers clearly show it. Compared to the recent SolarWinds Orion security breach that directly affected mostly large organizations, the Exchange vulnerabilities were used to …

Continue reading Three takeaways for a Small Business from the Microsoft Exchange hack

A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series

In a previous blog, I looked at the key differences between cybersecurity and cyber-resilience, and why cyber-resilience is a better approach for organizations to follow in 2021 because it is holistic. The IT cyber-resilience is a complex objective requiring a solid understanding and a structured approach. NIST Special Publication 800-160, Developing Cyber Resilient Systems, is one …

Continue reading A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series