Cloud computing offers a wide range of benefits – from low infrastructure & maintenance costs and scalability to better performance and flexibility. Yet, those rushing to the cloud without the...




To be competitive and support business growth, organizations relying on Operational Technology (OT) ecosystems must adopt new technologies – integrating innovations & enhancements with legacy...




Threat actors utilize a wide variety of tactics and tools to gain access to a target network – frequently using the network’s endpoints as entry points to reach the organization’s “crown jewels.”...




Potentially Unwanted Programs (PUPs) – also known as Potentially Unwanted Applications (PUAs) – often come installed with freeware. Commonly referred to as junkware, bundleware, or adware, PUPs...




The steep cost of data processing in Azure Sentinel – a crucial component of Managed Detection & Response (MDR) – poses a challenge for many large organizations that struggle to maintain effective...




We’re delighted to have had the opportunity to present at InfoSecurity Europe 2021! Jaimon Thomas, Global Head, Security Solutions at CyberProof, and Sinu Peter, Principal Security Architect,...




As migration to the cloud is increasing, so is the number and complexity of threats targeting the cloud. Security operations are evolving and need to accommodate these new threats alongside...




“To a great mind, nothing is little” remarked Sherlock Holmes, describing the process of one of his investigations. Reading through Holmes’ quotes, one can easily identify a connection between...




There is no doubt that the COVID-19 pandemic made rapid, wide-ranging changes to where and how we work. But are these changes permanent or will things revert to the way they were – once a vaccine...




Cyber extortion is when an individual or group obtains access to an individual’s systems or an organization’s systems using various malware techniques and encrypts their files, blocking access –...




The adoption of Microsoft’s Office 365 collaboration and email platform became much more widespread this year. In part, the switch is due to the phenomenon of Work from Home (WFH) – a practice...




Treating patients is not the only thing that hospitals and other healthcare providers need to worry about.




Hundreds and even thousands of popular browser extensions are available that support a variety of useful functions, from ad blocking and cookie management to text translation, grammar correction,...




International Women’s Day provided a rare opportunity to openly and honestly probe some of the challenges and opportunities for women of diverse background and cultures to build a career in cyber...




Wargaming is a unique and effective means of testing cyber readiness – by improving an organization’s ability to effectively handle real cyber attacks using planned attack simulations and...




It seems that a day doesn’t go by without another cyber breach catching the news headlines. As cyber threats of all types continue to increase – growing in number and sophistication –...




This is the second part of a 2-part series. To see part 1, click here




Organizations in the Financial Services (FS) industry face a wide range of threats – from supply chain risk and identity theft to online fraud and data manipulation. 




Defending an enterprise’s infrastructure successfully requires using multiple products that – when fit together effectively – create a comprehensive, multilayer defense.




Forrester’s recent report ‘NowTech: Managed Detection And Response Services Providers, Q4 2020’ provides an overview of Managed Detection and Response (MDR) vendors and the capabilities that...




Threat intelligence has become a near-universal component of modern cyber security strategies. According to a recent SANS CTI survey, in 2020 we saw more personnel dedicated to CTI functions than...




We’re excited to share that CyberProof’s recent virtual event, The Smarter SOC Summit, was a huge success – bringing together top cyber security professionals from around the globe to focus on...




Security teams are struggling to reduce the time to detect and respond due to the complexity and volume of alerts being generated from multiple security technologies. 




It’s been an upside-down year where none of the old rules seem to apply – even to Christmas shopping. For retailers, this year’s holiday season is starting earlier than ever and is expected to...




Threat actor activity in 2020 was been largely shaped by the COVID-19 pandemic – with cyber criminals exploiting the fear and uncertainty created by the pandemic for their own profit. Threat...




Forrester – one of the leading technology research firms – recently released a report to help organizations understand the value they can expect from Managed Security Service Providers (MSSPs) in...




Our security needs have grown this year – yet, security budgets in the current economic climate are tighter than ever. 




Technology builds the digital economy – yet, cyber security functions as a key pillar that helps it thrive. This fact has become even clearer this year throughout Australia with the recent...




The reality created by the COVID-19 pandemic has provided troubling opportunities for cyber criminals, who have been capitalizing on and abusing the global confusion. During the last six months,...




Forrester – one of the leading independent technology research firms – recently published its highly respected report: The Forrester Wave™: Midsize Managed Security Services Providers, Q3 2020.




The first line of defense for any organization is at the physical perimeter of the building or campus, which may be protected by gates, locks, security guards, closed-circuit TVs, front desk...




MITRE’s Attacker Tactics, Techniques, and Common Knowledge (ATT&CK) framework is a powerful tool for improving cyber defense by creating a smarter security operations center (SOC). 




CyberProof and Microsoft customers are now able to benefit from next-generation cloud-based managed security services to run a smarter and more cost-efficient SOC. This comes at a crucial time for...




5G is the next generation of mobile Internet connectivity, offering 100Xs faster transmission speeds and lower latency – thereby improving network performance, device connections, and application...




CyberProof’s Cyber Threat Intelligence (CTI) team discovered a new cyber crime marketplace using advanced threat intelligence techniques. The marketplace – named, Plugged – deals with multiple ...




This blog was co-authored with Kiran Belsekar, CISO at Aegon Life Insurance.




Tor browser is defined as a “free and open-source software browser for enabling anonymous communication.” Initially released in September 2002, Tor’s intended use is to protect the personal...




Forrester – one of the leading technology research firms – recently released two reports outlining the critical role Managed Security Service Providers (MSSPs) will be playing for their customers. 




A remote workforce needs ongoing training in order to successfully identify and report phishing and other types of cyber attacks. With so many employees based at home due to COVID-19, it’s more...




False and misleading rumors about COVID-19 have been flying around the globe to such an extent that it has been defined by the World Health Organization as an “infodemic” – or, according to some...




With the onset of the COVID-19 pandemic and the decision by nations around the globe to implement a lockdown, business continuity suddenly became the topmost priority for corporate leadership. How...




American IT outsourcer Cognizant is the latest high-profile company that has been hit by the Maze ransomware. Classed as a severe cyber attack, Maze disrupted Cognizant systems and caused service...




The COVID-19 pandemic only underscores what we’ve already known for a while: The old approaches to cyber security aren’t good enough anymore. We need much greater agility - a honed ability to...




Businesses have quickly adapted to utilizing new communication technologies, in this COVID-19 era. Zoom, one of the popular conferencing platforms before the outbreak, is now being used by...




The coronavirus crisis has led to a significant increase in the popularity of video streaming platforms such as Zoom. As a result, cyber criminals are showing greater interest in these platforms...




With the decision of Indian Prime Minister Narendra Modi to implement a country-wide lockdown last Tuesday, as much of a third of humanity is now at home – around 2.6 billion people –according to ...




As threat hunters, we have become increasingly aware of the greater need for diligence and awareness regarding the latest cyber security threat - hackers taking advantage of new vulnerabilities...