Regional hospital computer networks in Australia were shut down on September 30th due to a hospital ransomware attack – impacting hospitals belonging to the Gippsland Health Alliance and to the...




Outsourcing your SOC operations to a Managed Security Service Provider (MSSP) allows you to sidestep the logistical and financial challenges of maintaining a SOC operation in-house. 




SOC augmentation is all about scaling capabilities with proactive cyber security services from a third-party provider. In recent years, security providers have taken advantage of new technologies...




CyberProof’s analysts have discovered that WSH RAT was leaked on a prominent deep web hacking forum. The leak took place on September 17.




Building SOC operations from the ground up is a complex process that varies tremendously from one organization to the next. As pointed out in Gartner’s report on How to Plan, Design, Operate and...




Millions of accounts are currently vulnerable to Password Reset Man-in-the-Middle (MitM) attacks – a form of attack that allows even a relatively unsophisticated attacker to take over user...




All it takes is one minor mistake for any CISO to be in the spotlight following a cyber attack—who will be next after Target, Under Armour, or Yahoo?




With its data-driven analysis of the current cyber threat landscape, this year’s Verizon Data Breach Investigation Report (DBIR) is the most extensive to date – covering 86 countries based on data...




The IT ecosystem has undergone a transformation: first, with its move from on-prem, hardware-based systems to distributed, software-based systems in the cloud, then with the shift from single...




Today’s dynamic hybrid cloud environments require a new approach to cyber security. With its DevOps, microservices, containers, and other developments, the current IT environment is required to be...




Even the most skilled and experienced CISOs are facing two significant cyber security challenges—staying ahead of increasingly sophisticated cyber attacks and finding the resources to deal with...




The field of intelligence gathering has gone through tremendous changes – shifting drastically as, in the era of cyber, most intelligence gathering today takes place online. This shift to the...




Any mid-sized to large-sized organization with security ops continuously uncovers a wide range of cyber risks and threats. Some of the things that are discovered can be relatively innocuous, while...




As 2019 is just beginning, we can’t help wondering: What can security service providers expect in the coming year? Tony Velleca, CEO of CyberProof, shares his top cyber security insights and...




Forrester, one of the most influential research and advisory firms in the world, just released their report, The Forrester WaveTM: MSSPs Q3 2018




If you’re a computer security professional, the question is always there – lurking in the background: Is your security perimeter safe? 




In today’s business environment  where organizations are increasingly aware of the cyber threats to their businesses – having the capabilities of an advanced




Most organizations today have hybrid IT environment – where, on the one hand, there are legacy systems that are on-premises – and on the other hand, some systems and services are in the cloud.  




The darknet refers to a network of computers, nodes and websites that are purposely hidden from the “regular” Internet, or surface net. They are located on a network that’s encrypted – and because...




Consider the herculean challenge faced by those responsible for national security. No government can possibly protect its citizens against every single potential attack 




With Cyber Week 2018 fast approaching, we decided to write a series of blogs especially for the occasion – here is the first.  




With Cyber Week 2018 fast approaching, we decided to write a series of blogs especially for the occasion – here is the second of three. Read the first here  our guide to 3 top innovations not to...




Data breaches and serious cyber security incidents for businesses are becoming ever-more common and persistent across an expanding attack surface. With wide-ranging legislative changes such as the...




Defending your business from cyber-attack requires a sophisticated security strategy – one that covers everything from DDoS protection, Web application firewalls, and security information...




Verizon’s Data Breach Investigations Report (DBIR) is one of the most respected security research papers around today. Every year the company will shake the security industry with 




Significant data breaches have become a common occurrence. Just last month, Expedia-owned Orbitz revealed that it had been hacked and 880,000 customer records, including credit card numbers, were ...