Zero Trust and the New National Strategy for Cybersecurity

zero trust featured

January 26, 2022–The White House is expected to release a new strategy related to cybersecurity to address modern threats and vulnerabilities. Stemming from Executive Order 14028 on Improving National Cybersecurity, this strategy is expected to implement new standards and requirements for federal agencies built around the concept of zero-trust security.

What is zero trust, and how does it shape cyber defense? It will be the new paradigm around which IT, cloud systems, and information governance will revolve for government agencies. 

 

Read More

The Glupteba Botnet: Threats to Businesses and Consumers

botnet featured

December 7, 2021–the Google Threat Analysis Group (TAG) announced that it has identified and temporarily disrupted the Glupteba botnet responsible for infecting an estimated 1 million computers and IoT devices.

This temporary disruption seems to have slightly impacted the botnet’s operation, but currently, the network is still operational. 

Many of us may hear about botnets in the news or our compliance meetings… but what is a botnet? Here, we will cover the topic briefly and discuss the implications of Google’s move against this particular threat actor. 

 

Read More

What Are Encrypted and Fileless Malware?

malware featured

Malware is a significant, and continuing, problem. A 2019 Verizon study shows that 28% of all data breaches involve malware, and new forms of malware and ransomware are emerging into the wild almost daily.

The challenge of fighting malware is that hackers are finding new ways to inject programs into systems. Even with advanced compliance and security guidelines in private and public markets, these hackers are working every technical and social angle possible to attack industrial, commercial and defense systems. And, unfortunately, it only takes one malicious program to completely bring a system to its knees. We’ve seen this most recently and publicly with the Colonial Pipeline ransomware attack, which cost the company $2.3M. 

In the past 5 years, new forms of malware have emerged. Two of these, encrypted and fileless malware, have become more sophisticated and, thus, more dangerous. These attacks are harder to detect, using our existing security measures and assumptions about malware against us.

 

Read More