Current Topics and Information

Focused on the ever-changing information security landscape

Sub-header Photo

ACCUVANT BLOG

The Business Case for a Intelligence-Driven Security Program

Threat intelligence is a term that causes some people to roll their eyes – mainly because they’ve been relentlessly bombarded with the typical hype and hyperbole. The fact is, a modern enterprise security program that does not draw from an intelligence-driven approach lacks focus and is effectively missing something crucial. [...] Read more

Read more

Cyber Security Public Policy

Imagine a scenario where a highly motivated, trained, and well equipped enemy launched an invasion against the United States. Upon arriving at our shores, this enemy began grabbing anything of value—everything not literally fastened to the ground, and loaded these things onto a ship to take it back home. This scenario sounds far-fetched—but it’s happening every hour of every day here in the United States. [...] Read more

Read more

Protecting Personal Devices

The holiday season has come and gone, and 2015 is officially upon us. Many of us are back at work toting a shiny new tablet, phone or laptop we were fortune enough to receive as a gift. But before you start surfing the Internet or installing applications (apps), an important first step to take is to enhance your security by “hardening” your device. [...] Read more

Read more

Diversionary Tactics 101

When organizations are hacked or infected with malware, an important question they ask themselves is, “Who is attacking us?” Understanding an attackers profile gives your organization insight into their motives, tactics, and what they are after. The more you know about them, the more effective your strategy will be. [...] Read more

Read more

How To Survive Breach Failure (Part 3 of 3)

To effectively prepare for the possibility of a breach, it is paramount for your organization to have an effective incident response (IR) plan in place, and then stick to that plan if your organization does become under attack. But even if you successfully navigate through the incident, there are still several moments presented after a breach that are potential failure points for organizations. [...] Read more

Read more

How To Survive Breach Failure (Part 2 of 3)

Before an incident occurs , it is important for organizations to have a comprehensive incident response (IR) plan in place. In the chaos that arises during a breach, CISOs and security leaders need to avoid the natural tendency to drift from the established process, and make decisions that align with the formal IR plan. [...] Read more

Read more

How To Survive Breach Failure (Part 1 of 3)

Many organizations have developed security response procedures to satisfy compliance and regulatory requirements; however, when a breach does occur we regularly see organizations making decisions or performing actions that don’t align with the established incident response plan. [...] Read more

Read more

Protecting Against the Inevitable

Imagine this situation: you are sitting in your office, all is going well, when you receive an urgent invite for a due diligence committee meeting to potentially acquire another business. This isn’t the first time your company is evaluating acquisition targets; and then it hits you – the last time this happened your organization came under attack. [...] Read more

Read more

Know Your Firewall

Firewalls have been around for decades, and many organizations have had the same firewall technology in place for just as long. Even with the evolution of different security technologies now integrated into next generation firewalls, your firewall rules are not going away any time soon. [...] Read more

Read more

'Tis the Season for Phishing

It’s that time of year again, the holiday season. A time filled with friends, family, good food, and celebration. But of course it has its downsides as well; stress, debt, long lines and crowds. Many of us try to make the holiday shopping season a little easier by purchasing our gifts online in the safety and comfort of our homes. [...] Read more

Read more
(150 Results)