The Detect Function of NIST enables timely discovery of cybersecurity events. Examples of outcome Categories within this Function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes. In order to detect cyber security events in your environment you should deploy a SIEM. A SIEM or Security information and event…
By Kip Kirchberg Seems that everyday you see something in the news about the latest cybercrime activity leaked emails, viruses, stolen funds, crypto ware and more. You can take practical steps to protect yourself and your company from falling victim to Cyber Attacks that leverage Malware or Ransomware. Malware…
By Kip Kirchberg When you think of a “hacker" you probably envision some kind of hoodie-wearing teenager with black fingernail polish, a laptop plastered with techie stickers and an array of empty energy drink cans surrounding them. If you’re like me, you probably also picture a movie like the Matrix…
Over the weekend several news outlets such as The Wall Street Journal, Reuters and the Washington Post reported that Cyber Security Intrusions were detected across the globe. The Cyber Incident appears to be the result of hackers who are believed to be working for foreign governments. These Cyber Criminals were…
Since the onset of Covid-19 online retailers have seen double and triple digit increases in online sales. Many retails share that monthly online sales numbers are rivaling that of holiday sales of the pasts. The increase in online sales has also increased the number of unauthorized use of a credit…