Are legacy apps lurking on your network?

Posted by:

Network audits can be instrumental in sanitising your systems, ensuring there are no legacy, outdated or vulnerable applications lurking on the network.

You probably don’t need us to tell you that networks are complex beasts. Network administrators walk a tightrope between making sure all files are available for the right people at the right time, and ensuring that the unauthorised are denied access at every turn.

Knowing what is on your system is vital – we’ve previously Read More →

0

TBG Security secures top placement in the Palmetto Cyber Defense Competition

Posted by:

Earlier this month, TBG Security took part in the The Palmetto Cyber Defense Competition (PCDC).

PCDC is a three-day cyber defense competition created through the collaboration of two organizations: the Space and Naval Warfare Systems Center Atlantic (SPAWAR) and the South Carolina Lowcountry Chapter of the Armed Forces Communications and Electronics Association (AFCEA).

Designed to energize high school and college students about an exciting future in the cybersecurity ...

Read More →
0

Addressing the PEBCAK scenario: protecting systems against rogue employees (PART 2)

Posted by:

malicious employeeIn the PART 1, we discussed how non-malicious employees can disrupt business continuity. This post will focus on the malicious or rogue employee and outline what you can do to obstruct an inside job.

First off, many wonder just how big of a problem is posed by rogue employees? Take a look at these recent ...

Read More →
0

The PEBCAK scenario: securing systems against non-malicious employees

Posted by:

Ever use the expression PEBCAK? What about ID-Ten-T error?*

While many variations exist, they all mean the same thing: user error. Ignoring the negative sentiment implied, it’s effectively a shorthand to say, “not our fault.”

In the world of, say, technical support, perhaps this expression might be acceptable. Many tech support teams exist simply to ensure their widgets are functioning correctly. But when an IT representative uses such terms to refer to a user within the organization, shouldn’t it raise a red ...

Read More →
1

How to get stakeholder ‘buy in’ for regular penetration testing

Posted by:

Yet another massive breach was confirmed last week, after 2.2 million patient and employee private records at cancer treatment provider 21st Century Oncology Holdings were found to be accessible to unauthorized third-parties.

Patients’ names, Social Security numbers, physicians’ names, diagnoses and treatment information, as well as insurance records could now all be in the clutches of unauthorized individuals. Ouch.

The FBI made the organization Read More →

0

Penetration testing: Don’t caught with your pants down

Posted by:

Why is penetration testing important?
You can’t fix what you don’t know is broken.

Discovering a leak only when some unauthorized visitor has taken advantage of it sucks.

Ask anyone who’s gone through it. Hackers might have slipped into your network to snoop around, nab confidential information and/or cause havoc…Whatever the case, this is most definitely a situation that is better avoided.

At USENIX Enigma 2016, NSA TAO Chief Rob Joyce presented Disrupting Nation State Hackers. In this ...

Read More →
0

OCIE’s Cybersecurity exams 2016: what you need to know now

Posted by:

SEC Cybersecurity ExamsWe are all aware that more high-profile cyber attacks are expected, so it is no surprise that the SEC’s Office of Compliance Inspections and Examinations (OCIE) have stated that cybersecurity will continue to be a priority for 2016.

In fact, The OCIE announced that the cybersecurity exams will include more in-depth assessments procedures and control implementations within organizations, but more ...

Read More →
0

Three BIG security threat predictions for 2016: Make sure you are covered!

Posted by:

With many security companies pushing out their threat predictions for 2016, we thought it best to review as many as we could in order to compile a definitive list of what to look out for in this coming year.

And, as independent consultants without any direct or indirect ties to specific security providers, we are well placed to provide an product-agnostic perspective on the state of security in 2016.

More importantly, we wanted to give you expert advice on how you can ...

Read More →
0
Page 7 of 7 «...34567
})
SEC Cybersecurity Exams