-
The Cyber Kill Chain or: how I learned to stop worrying and love data breaches
- July 22, 2016
- Posted by: GSS Ghana
- Category: Data Security, Information Security
No CommentsThe Cyber Kill Chain or: how I learned to stop worrying and love data breaches July 22, 2016 Posted by: GSS Ghana Category: Data Security, Information Security No Comments Pulling off a heist is no easy feat – and in order to prevent theft, you best understand the plan of attack. Like any good ol’ -
The Pyramid of Pain
- July 22, 2016
- Posted by: GSS Ghana
- Category: Risk Management
The Pyramid of Pain July 22, 2016 Posted by: GSS Ghana Category: Risk Management No Comments To illustrate this concept, I have created what I like to call the Pyramid of Pain. This simple diagram shows the relationship between the types of indicators you might use to detect an adversary's activities and how much pain it will -
The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges
- July 22, 2016
- Posted by: GSS Ghana
- Category: Information Security
The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges July 22, 2016 Posted by: GSS Ghana Category: Information Security No Comments “If you always do what you’ve always done, you’ll always get what you’ve always got.” This kernel of wisdom comes from a certain high-tech headhunter in the -
The Security Cost of Free Smartphone Apps
- July 6, 2016
- Posted by: GSS Ghana
- Category: Information Security, Risk Management
The Security Cost of Free Smartphone Apps July 6, 2016 Posted by: GSS Ghana Category: Information Security, Risk Management No Comments There are hundreds of thousands of them to choose from now whether you have an iPhone, an Android or some other version of smartphone. Free mobile applications sound like a great bargain, but be -
Russian Threat Group Targets Clinton Campaign
- June 16, 2016
- Posted by: GSS Ghana
- Category: CTU Research
Russian Threat Group Targets Clinton Campaign June 16, 2016 Posted by: GSS Ghana Category: CTU Research No Comments Governments like to know what the leaders of rival countries are really thinking. To answer these questions, they may turn to their spy agencies, tasking them with obtaining information on policy and strategy that other countries would -
Best Practices for Confidence in the Cloud
- June 13, 2016
- Posted by: GSS Ghana
- Category: Cloud Security
Best Practices for Confidence in the Cloud June 13, 2016 Posted by: GSS Ghana Category: Cloud Security No Comments Until recently, most cloud migration decisions were made without the benefit of the CISO's guidance. In an effort to take advantage of cloud efficiencies, line-of-business users have moved critical assets and confidential data to the cloud -
Malware Lingers with BITS
- June 6, 2016
- Posted by: GSS Ghana
- Category: CTU Research
Malware Lingers with BITS June 6, 2016 Posted by: GSS Ghana Category: CTU Research No Comments Threat actors leveraged a “notification” feature in the Windows Background Intelligent Transfer Service (BITS) to download malware. In May 2016, the SecureWorks® Incident Response (IR) Team conducted an engagement involving a malware compromise. Antivirus software had previously detected and
Contact Global Secure Solutions by completing our online feedback form.