-
Hackers Are Selling a Critical Zoom Zero-Day Exploit for $500,000
- April 24, 2020
- Posted by: Edem Glymin
- Category: Data Security, Risk Management
No CommentsBy Lorenzo Franceschi-Bicchierai , Source: Motherboad, Tech by VICE Hackers are selling two critical vulnerabilities for the video conferencing software Zoom that would allow someone to hack users and spy on their calls, Motherboard has learned. The two flaws are so-called zero-days, and are currently present in Zoom’s Windows and MacOS clients, according to three
-
Zero-day attacks: Protections, best practices and how to implement them
- April 9, 2020
- Posted by: Edem Glymin
- Category: Information Security, Risk Management, Threat Intelligence
Sources: InfosecInstitute Zero-day (0day) exploit, Imperva Cybersecurity: How to get your software patching strategy right and keep the hackers at bay, ZDNet Five Key Capabilities To Look for in a Managed Web Application Firewall (WAF) Provider, GBHackers on Security Introduction Zero-day attacks are one of the most dangerous cybersecurity threats. This type of
-
What is a Cyber Threat? How to Explain Cyber Threats to Your CEO
- February 19, 2017
- Posted by: Edem Glymin
- Category: Information Security, Risk Management
What is a Cyber Threat? How to Explain Cyber Threats to Your CEO February 19, 2017 Posted by: Edem Glymin Category: Information Security, Risk Management No Comments How to explain cyber threats to your CEO and others. Learn more about the potential for risk What is a cyber threat? To explain what a cyber threat -
Vulnerability And Patch Management
- February 18, 2017
- Posted by: Edem Glymin
- Category: Risk Management
Vulnerability And Patch Management February 18, 2017 Posted by: Edem Glymin Category: Risk Management No Comments The purpose of the Vulnerability Assessment policy is to establish controls and processes to help identify vulnerabilities within the firm’s technology infrastructure and information system components which could be exploited by attackers to gain unauthorized access, disrupt business operations -
How to Apply Proper Risk Management Methodology on Information Security?
- February 18, 2017
- Posted by: Edem Glymin
- Category: Risk Management
How to Apply Proper Risk Management Methodology on Information Security? February 18, 2017 Posted by: Edem Glymin Category: Risk Management No Comments How to apply proper risk management methodology on information security? Risk in its negative way might be defined as one undesired consequence that may or may not occur, as a result of specific -
A Letter to the CISO; Talk about Business with your Board, not technicality.
- February 18, 2017
- Posted by: Edem Glymin
- Category: Risk Management
Dear CISO and Board I think we should always consider our job as a part of the business. We finally started to consider cyber security and data protection as a serious issue but now the question is how we evaluate a risk in our analysis and business plans… Current documentations and reports, for risk analysis,
-
How Business Email Compromise Scams Can Hurt Your Business
- October 27, 2016
- Posted by: GSS Ghana
- Category: Risk Management
How Business Email Compromise Scams Can Hurt Your Business October 27, 2016 Posted by: GSS Ghana Category: Risk Management No Comments Today’s digital frontier can be very much likened to the old days of the Wild West. In this present era identified by the ubiquitous nature of the Internet, cybercriminals are calling the shots; constantly -
The Business Risk of Cyber Threats to Ghana’s Banking & Financial Systems
- October 27, 2016
- Posted by: GSS Ghana
- Category: Risk Management
The Business Risk of Cyber Threats to Ghana’s Banking & Financial Systems October 27, 2016 Posted by: GSS Ghana Category: Risk Management No Comments The Cyber Security Threat Landscape Unless you have been living under a rock for the last few years you most certainly have been struck in awe by the overwhelming impact of -
Future SOC
- August 27, 2016
- Posted by: GSS Ghana
- Category: Risk Management
Future SOC August 27, 2016 Posted by: GSS Ghana Category: Risk Management No Comments Are you waiting for something bad, or going somewhere good? A CEO asked me that once. It is one of those deep questions that more information security people need to ask themselves. In the world of cybersecurity, the conventional thinking for -
The Pyramid of Pain
- July 22, 2016
- Posted by: GSS Ghana
- Category: Risk Management
The Pyramid of Pain July 22, 2016 Posted by: GSS Ghana Category: Risk Management No Comments To illustrate this concept, I have created what I like to call the Pyramid of Pain. This simple diagram shows the relationship between the types of indicators you might use to detect an adversary's activities and how much pain it will
- 1
- 2
Contact Global Secure Solutions by completing our online feedback form.