• 844-558-4782

CyberVista Blog

Malware Analysts - Cybersecurity's Bomb Squad

Malware Analyst - Cybersecurity’s Bomb Squad Imagine the detonation of an explosive digital bomb, undoing thousands of hours of hard work and reducing your organization’s network to a pile of binary rubble. You or your team members didn’t even realize the weapon was within your organization’s perimeter. You never [...]
Read More

Sep 21, 2017

0

The Value of Cybersecurity Tabletop Exercises for Leadership Teams

The Value of Cybersecurity Tabletop Exercises for Leadership Teams The lessons learned from cybersecurity tabletop exercises will minimize the impact of your organization’s next data breach. If the adage is correct and success is 90% preparation and 10% perspiration, then will a cybersecurity tabletop exercise [...]
Read More

Sep 19, 2017

0

Vulnerability Management Analyst - The Cyber Inspector

Vulnerability Management Analyst - The Cyber Inspector The cliche, “You are only as strong as your weakest link,” is particularly true for the field of vulnerability management. Vulnerabilities are the entryways by which threat actors enter and then wreak havoc within an organization. Cybersecurity is in constant [...]
Read More

Sep 14, 2017

0

How to Calculate ROI on Cybersecurity Investment

How to Calculate ROI on Cybersecurity Investment By Tom Kellermann, CEO, Strategic Cyber Ventures As a Chief Information Security Officer, you have the unenviable responsibility of presenting cybersecurity investment plans for the future while facing scrutiny of such investments from some stakeholders and [...]
Read More

Sep 12, 2017

0

The Farmer and the Equifax

The Farmer and the Equifax In the wake of the Equifax consumer data breach, many of the stories in the past days share well-articulated insights that are nonetheless written with that full 20/20 hindsight in play. There even is evidence that Equifax itself took this path two years ago in the wake of the Experian [...]
Read More

Sep 11, 2017

0

How Not To Be One of the Six Million Instagram Hacked Accounts

How Not To Be One of Six Million Instagram Hacked Accounts What Happened? Instagram, social media’s beloved photo and video sharing app to more than 700 million monthly users, suffered a significant data breach last week. Originally, the hack seemed to be solely focused on gaining access and exploiting the [...]
Read More

Sep 7, 2017

0

Threat Hunter: Cybersecurity's Trackers

Threat Hunters - Cybersecurity’s Trackers You’ve mulled over the idea of becoming a threat hunter, haven’t you? If you’ve considered a career in threat intelligence or penetration testing then you may want to also consider a career in threat hunting. What Does It Mean To Be A Threat Hunter? With newsworthy [...]
Read More

Aug 31, 2017

0

Why Corporate Leaders Should Follow China's Five Year Plan: Part 4

Why Corporate Leaders Should Read China’s Five Year Plan Welcome back to our series on the ties between corporate security and China’s Five Year Plan (FYP), which serves as the country’s national economic and policy roadmap. The FYP’s five key themes are Innovation, Coordinated Development, Green Growth, [...]
Read More

Aug 29, 2017

0

Penetration Tester: Cybersecurity's Undercover Agent

Penetration Tester -  Cybersecurity’s Undercover Agent Glad to see you’ve returned to our blog series, where we discuss the positions in the ever-growing information security job market. In our fourth post, we’ll review the role and responsibilities of a Penetration Tester. Do you ever wonder how threat actors [...]
Read More

Aug 24, 2017

0

Can Your Board Handle A Cyber Crisis

Can Your Board Handle A Cyber Crisis? By Susan Shultz, CEO of The Board Institute, and Jeff Welgan, Head of Executive Training Programs, CyberVista. It finally happened. Your company was hacked. Your customer data is for sale on the dark web, and, also, it is now publicly available on the Internet. How much does [...]
Read More

Aug 22, 2017

0