Red teaming is one of the best ways to ensure your organization is thinking critically about its cybersecurity posture. In her latest column in Forbes – How to Use Red Teaming in Your Cybersecurity Program, Partner Christie Terrill highlights three red team strategies your organization could use to evaluate any vulnerabilities.
News & Events
News in category "News"
Advances such as machine learning and artificial intelligence have critical roles in today’s security solutions but do not completely replace the need for human intellect to manage the process and analyze results. This topic is discussed in the ZDNet article – Automating Security? Robots Can’t Replace Humans in Decision Loop – which includes …
The new PetrWrap uses the infamous Petya ransomware to encrypt its victims’ data and could be a sign of increasing competition within ransomware gangs. Security Analyst Gerben Kleijn is quoted in this Dark Reading article – New ‘PetrWrap’ Signals Intensified Rivalry Among Ransomware Gangs.
With the current cybersecurity talent shortage, companies may need to consider outsourcing some of their security functions. In her latest column in Forbes – The Top 5 Security Functions to Outsource, Partner Christie Terrill suggests five possible areas to outsource that require minimal business context to gain consistent and effective results.
Most everyone has heard the recent Wikileaks story about CIA hacking everyday devices, but there may be a silver lining with respect to computer security. Security Associate Dan Petro is quoted in this CNET article – CIA Hacking? Hooray! Privacy Advocates See an Upside.