Springing the Trap: The SolarMarker Attack

We’ve all heard the maxim about free stuff on the internet, which says that if something is free, YOU are the product. For this reason, you must be a critical consumer of anything that you find free online, particularly if you are a small business owner. … Read more

Latest Joint Cybersecurity Advisory Report Released

With the COVID-19 pandemic and the ensuing upheaval of places of work, worship, and schooling caused by months of lockdowns, business has been pretty good for cybercriminals. More than ever before, we have depended on the ability to work, learn, and interact with each other online. … Read more

Estimating Reputation Risk

Reputation risk appears in many forms and is a relevant topic for organizations across all industries. If left unaddressed, these risks can provide a path for incidents to occur that can cause large-scale damage to an organization’s revenue, value, and customer base. Significant amounts of research have been … Read more

The Real Cost of Reputation Risk – An Introduction

The Federal Reserve System defines reputation risk as “the potential that negative publicity…whether true or not, will cause a decline in the customer base, costly litigation, or revenue reductions.”  FISMACS Reputation Risk Series was designed to educate organizations on the full cycle of reputation risk management … Read more

How to Avoid and Combat Reputation Risks

The Federal Reserve System defines reputation risk as “the potential that negative publicity…whether true or not, will cause a decline in the customer base, costly litigation, or revenue reductions.”  FISMACS Reputation Risk Series was designed to educate organizations on the full cycle of reputation risk management … Read more

Decision Support Models for Cyber

If ever there was a field ready, willing, and able to use data to drive decision-making, cybersecurity is that field. In some industries, the transition from what is fundamentally opinion-based decision-making to data-driven decision-making can be a hard sell. For people who don’t work with data … Read more

Female Pioneers in Technology

As with any exploration of history, it can take additional effort to surface the stories of women. Too often excluded, erased, or diminished in the retelling of history, women have nonetheless made significant contributions to the technology field, stemming from their groundbreaking work in scientific coding, programming, cryptology, and innovation.   Here are some of … Read more

When the “One who Knocks” is Already Inside the House

Perhaps the most fascinating and overwhelming aspect of cybersecurity is knowing that the threats can come from anywhere. Sometimes systems are hacked by sophisticated, organized criminal hackers, and other times, it’s by people we would never suspect.  While the school security team and admins were over … Read more

Attackers Take a Page From Nature

A predator will lie in wait for its prey, often camouflaged blending into the background. Then, when the unsuspecting victim gets too close, it attacks without mercy. Such is the way of nature, and so too has become the way of the cyber-attack. The attack is … Read more

New Managing Risk Paper

X