BLOG

What does a holistic cybersecurity strategy look like?

What does a holistic cybersecurity strategy look like? The difference between a traditional and a holistic cybersecurity approach IT and top technical products are no more responsible alone for the security of our digital assets. Cybersecurity now needs a strategy. One that involves technology, the people, and the processes. As

Read more »

Why IoT could be our greatest cybersecurity risk

Why IoT could be our greatest cybersecurity risk The Internet of Things offers us new ways to build potential value and offer it without human intervention. The seeming boon of the IoT is also its greatest risk. With over 26 billion devices projected to form part of the IoT in

Read more »

2020: The year of unknown cyber threats. Are you cyber-ready?

2020: The year of unknown cyber threats. Are you cyber-ready? Most traditional security systems and products are built to address known threats. When they see and detect something malicious, they block it. Now, to get past these products that block known threats, attackers are forced to innovate and come up

Read more »

Cyberthreat a worldwide risk? [and tips on navigating the threat]

Cyberthreat a worldwide risk? [and tips on navigating the threat] The 15th edition of the World Economic Forum’s Global Risk Report is out. Alongside recognizing the economic, environmental, geopolitical, and societal risks, the report also emphasizes on technological risks in the form of cyberattacks that face us in 2020, more

Read more »

5 Ways to make cybersecurity more efficient with automation

5 ways to make cybersecurity more efficient with automation Toward the end of 2019, the cybersecurity workforce amounted to 2.8 million professionals, while the number of trained professionals needed to close the gap was 4.07 million. This data hints at the urgent need to increase the current cybersecurity workforce by

Read more »

CVE-2020-0601 / VULNERABILITY IN THE CRYPTOAPI OF WINDOWS (CRYPT32.DLL)

CVE-2020-0601 / VULNERABILITY IN THE CRYPTOAPI OF WINDOWS (CRYPT32.DLL) Execution of a Trojan horse signed with an exploit of the CVE-2020-0601 A spoofing vulnerability has been discovered in the way the Windows cryptographic library (crypt32.dll) validates certificates composed of elliptic curves (ECC). Successful exploitation of this loophole could lead to

Read more »

Targeted Ransomware and Cyber Insurance to Rise in 2020

Targeted Ransomware and Cyber Insurance to Rise in 2020 In 2019, experts predicted that one business will fall prey to ransomware every 14 seconds. By 2021, that span will shrink further to 11 seconds. The global ransomware damage costs are expected to escalate to up to $20 billion by then.

Read more »

Ransom War 1

RANSOM WAR #1 There is a significant increase in ransomwares attacks, with many organizations hit by (almost) unknown threats, mixing APT technologies with improved offensive features. Of course, after such an incident, companies should avoid paying the ransoms, and real backups could help in case of large incidents.  But let’s

Read more »

eGambit : a holistic cybersecurity solution

eGambit : a holistic cybersecurity solution Introduction According to a recent survey released by McKinsey, cybersecurity has become a top concern of the world’s business leaders that are willing to dedicate adequate funds to address it, yet lack appropriate, integrated and effective tools to support fast, fact-based cyber security management.

Read more »

eGambit Endpoint Security versus CrashOverride

eGambit Endpoint Security versus Crash Override Introduction​ This article will focus on offensive weapons disclosed (June 2017) and linked to Industrial Controls Systems (ICS) security issues. These tools would be linked to previous cyberattacks against critical infrastructure in Ukraine (2016). What to know about these malwares ? Family name :

Read more »