![](https://www.directdefense.com/wp-content/uploads/2021/06/JBS_2_DirectDefense-1024x768-1.jpeg)
What If a Ransomware Attack Took Down Your Business Operations – and Could Have Been Prevented?
The recent ransomware attack at meat processor JBS SA proves the need for a business continuity and disaster recovery plan.
Successful mitigation of today’s security threats requires an approach that is both on the offensive and on the defensive. Here, we give our take on how to approach and handle specific security challenges, as well as our reaction to some of the latest industry topics.
The recent ransomware attack at meat processor JBS SA proves the need for a business continuity and disaster recovery plan.
The Colonial Pipeline shutdown should be seen as a serious incident pointing to the precariousness of critical infrastructure security.
Keep Your Organization Safe Around the Clock with a Cybersecurity Operations Center from an MSSP Here’s a projection that’s hard to ignore: the cost of cybercrime is expected to exceed $8 billion by 2022. The reality of that amount of financial fallout from cyber attacks is staggering. Driving up the cost of cybercrime is the… Read more »
Assessing the Cost of Security Vulnerabilities During a Pandemic Year As everyone is aware, the pandemic of 2020 made conducting business, even at a basic level, challenging. Organizations were faced with managing their existing security vulnerabilities, in addition to adapting their information security to the “new normal”. In March, companies across the U.S. completed a… Read more »
The Complexities Created by Using JavaScript Object Notation to Transfer Data Among the web application vulnerability tests that we perform at DirectDefense is an application security assessment for CSRF. CSRF, or Cross-Site Request Forgery, is an attack that takes advantage of the predictability of requests and browsers’ automatic submission of session cookies to perform unintended… Read more »
Revisiting the Security Threats That Marked 2019 and How They Were Managed Wow, what a year it has been! Security attacks in 2019 were marked by a resurgence of Ransomware attacks, business email compromise (BEC) attacks, and the discovery of painful blind spots in existing security programs for our new, and in some cases older,… Read more »
Assessing the Successes (and Failures) of Organizations’ Information Security Orchestration and Automation Response Solutions As 2018 comes to a close, we must look at the information security and managed services trends already established this year, and those on deck for 2019. To get things going ahead of the new year, we thought we would share… Read more »
No, this blog post isn’t about the credit cards or identity theft. It’s about the tools that, as a security professional, you should keep stored in your “security wallet.” Like any tradecraft, security professionals should have a set of tools, in this case, applications, websites, and resources, that they keep on-hand. These items become your… Read more »
A version of this blog is also posted on the MIST InfoSec Insider site: https://misti.com/infosec-insider-search. We’re surrounded by networks, many not our own. It’s next to impossible to run a business today without network interconnectivity. Even the smallest mom-and-pop shop has a website and hosting provider that connect to at least one computer holding client… Read more »
New System Vulnerabilities You Need to Know About Researchers have disclosed vulnerabilities in the way processors are handling memory management while data is traversing the central processing unit of your system. The latest update on these vulnerabilities can be found at this post from Project Zero. Vulnerability Details: What You Need to Know There are… Read more »