Category Archives: Information Security

CYBER INSURANCE


Lloyd’s of London has announced that its insurance policies will no longer cover losses resulting from certain nation-state cyber attacks or acts of war. This could be soon followed by other insurers. In fact a similar stand was taken by … Continue reading

Posted in APT, Cyber Insurance, cyber security, Cyber Warfare, Data Breaches, Information Security, Threats | 1 Comment

Cyberbiosecurity


Cyberbiosecurity is an emerging discipline and a complex subject. Through this post, I hope to make the readers aware about this complex concept and attempt to simplify it for their understanding.  This is a very high-level overview and the objective … Continue reading

Posted in Biological Threats, Crisis Management, cyber security, Information Security, Supply Chain, Threats | Leave a comment

EU Cyber Resilience Act – A Step towards securing Supply Chain


Supply Chain is increasingly becoming a major point of failure when it comes to cyber attacks. Over the years we have seen several critical vulnerabilities in products that have jeopardized security gloabally. The EU Cyber Resilience Act is a step … Continue reading

Posted in CIP, cyber security, Government Legislations, Information Security, Supply Chain | Leave a comment

Communicating Cybersecurity with the Board and Executive Management


In the digital world that we live in today, cybersecurity has managed to grab the headlines time and again. Hacks, data breaches, ransomware, denial of service attacks, and what not. Furthermore, cybersecurity has consistently been ranked in the top 5 … Continue reading

Posted in cyber security, Information Security, Uncategorized | Leave a comment

Cybersecurity, privacy, infrastructure management and emerging technologies rank as top tech challenges: survey


Cybersecurity, privacy, infrastructure management and emerging technologies rank as top tech challenges: survey Cybersecurity and privacy issues, along with infrastructure management and emerging technologies, rank as the top technology challenges organizations face today, according to a survey report from global … Continue reading

Posted in Audit, CIP, Compliance, cyber security, Data Privacy, Information Security, Internet of Things, Privacy, Risk Management, Smart Cities, Threats | Tagged , , , , , , , , , | Leave a comment

Master Decryption Key for Original Petya Ransomware Released


Master Decryption Key for Original Petya Ransomware Released Janus Cybercrime Solutions, the author of the original Petya ransomware, released the master decryption key for all previous Petya versions earlier this week. The person/group uploaded the master key as an encrypted … Continue reading

Posted in APT, CIP, Cryptography, cyber security, Cyber Warfare, Disaster Recovery, Information Security, Malware, Tools | Tagged , , , , , , , , | Leave a comment

What is an Indicator of Attack (IOA)


What is an Indicator of Attack (IOA) IoAs is some events that could reveal an active attack before indicators of compromise become visible. Use of IoAs provides a way to shift from reactive cleanup/recovery to a proactive mode, where attackers … Continue reading

Posted in APT, Audit, CIP, cyber security, Information Security, SIEM, Tools | Tagged , , , , , , , | Leave a comment

WannaCry


WannaCry Ransomware The Ransomware took the world by storm and there is not anybody who is somebody in cyber security who has not spoken about it now….I really do not want to add myself to the list… But here is … Continue reading

Posted in APT, CIP, Crisis Management, Cryptography, cyber security, Data Breaches, Information Security, Malware, Resilience, Threats | Tagged , , , , , , , , , | Leave a comment

Black Swan Event


Black Swan Event: What exactly is a Black Swan? As Nassim Nicholas Taleb wrote in his 2007 book, The Black Swan, such extreme events have three key characteristics: 1. Their probability is low, based on past knowledge and experience. 2. … Continue reading

Posted in BCM, CIP, Crisis Management, cyber security, Cyber Warfare, Disaster, Disaster Management, Disaster Recovery, Information Security, Resilience, Threats | Tagged , , , , , , , , , , , , , | Leave a comment

Researchers crack open unusually advanced malware that hid for 5 years


Researchers crack open unusually advanced malware that hid for 5 years Espionage platform with more than 50 modules was almost certainly state sponsored. Dan Goodin Security experts have discovered a malware platform that’s so advanced in its design and execution … Continue reading

Posted in APT, CIP, Cryptography, cyber security, Cyber Warfare, Data Breaches, Data Privacy, Information Security, Malware, PKI, Privacy, Risk Management, Threats | Tagged , , , , , , , , , , , | Leave a comment