Posts

Showing posts from December, 2021

More than 1,200 phishing toolkits capable of intercepting 2FA detected in the wild

A team of academics said it found more than 1,200 phishing toolkits deployed in the wild that are capable of intercepting and allowing cybercriminals to bypass two-factor authentication (2FA) security codes. Read More...

Cortex XDR: Breaking the Security Silos for Detection and Response

Government security teams face threats ranging from ransomware and cyber espionage to fileless attacks and damaging data breaches. But the biggest headache for many security analysts is not the endless number of risks, but rather the repetitive tasks they must perform every day to triage incidents and attempt to whittle down an endless backlog of alerts. Read this paper to understand the thorniest challenges security analysts confront, and to get a framework for tackling every stage of security operations with Cortex XDR for detection and response. View: Cortex XDR: Breaking the Security Silos for Detection and Response

T-Mobile reportedly suffers another, smaller data breach

Following a large breach earlier this year, some T-Mobile customers appear to have gotten an unwelcome end-of-year surprise. Read More...

SolarWinds: The more we learn, the worse it looks

 As time goes by, we're learning more and more about the SolarWinds hack - and the more we learn, the worse it looks. Read this ZDNet article to see why one tech journalist calls the hack the "Pearl Harbor of American IT," and why no organization should rest easy when it comes to cybersecurity. Read More...

IBM Security Summit

Over the past year we've watched the evolution of supply chain and ransomware attacks gain momentum in scale, pervasiveness, and unpredictability. Now more than ever, it's important for the public and private sectors to come together and unite against the damaging impact these attacks present to all industries, government services, and to the general public. Watch this video from IBM Security that brings together the country's top regulators, corporate CISOs, and cyber security experts. Topics covered will include national security and business risks posed by security threats and how to best respond. When you're ready to describe flexible pricing plans and implementation, contact an IBM security expert at Cyber Security Consulting Ops. Read More...

The 2020 State of Security Operations

This study by Forrester Consulting evaluates the state of today's enterprise security operations, SecOps resourcing, tools, challenges, and opportunities. Read More...

Pay Now or Pay Later: Don't Procrastinate When It Comes to Preventing Ransomware

Data breaches like ransomware can be catastrophic for your business. Not only can you lose revenue from the downtime that occurs during the incident, but the post-breach costs can also be significant. IBM recently published the findings from its 2021 Cost of a Data Breach Report. This year's report found that ransomware attacks were more expensive than average breaches, costing on average $4.62 million, excluding the cost of paying the ransom. The percentage of companies where ransomware was a factor in the breach was 7.8 percent. Read this blog to learn why ransomware is so costly and how you can limit the damage of an attack with Zero Trust cyber security solutions. Read More...

 Rewiring Security Operations

Today's siloed security tools force analysts to pivot from console to console to piece together investigative clues. This can result in painfully slow investigations and missed attacks. Faced with a shortage of security professionals, teams must simplify operations. Watch this video to see how Cortex XDR integrates data from across the digital domain and accelerates investigations, allowing users to stop attacks before the damage is done. Read More...

The Silver Lining to Cloud Security

The world has witnessed a massive shift in the way most organizations work. Much of that transformation included migrating workloads to cloud and enabling remote access for workforce, with varying levels of security and trust. Cloud has made life easier for organizations but with benefit often comes risk. In a recent Forrester Consulting survey, commissioned by IBM, 75% of decision-makers said that securing their hybrid cloud environment was more challenging than ever before, and fewer than half said that they had a documented, holistic, cloud security strategy. In this highly informative webinar, you will hear from industry experts on the fundamental principles and strategies underlying cloud security. Check it out and contact us for pricing and implementation details. Read More...

The Future of Work is Hybrid

This eBook discusses how Cisco Webex is leading the way for hybrid work innovation as the first best-of-breed suite for integrated hybrid work experiences that is trusted by 85% of Fortune 500 companies and has been awarded high marks for security by the NSA. Please contact Contoso Tech for more information about Cisco Webex. Read More...

Commercial International Bank of Egypt's Zero Trust Journey with IBM Security

Commercial International Bank, the largest bank in Egypt, works hard to protect their organization, employees, and customers. They needed a solution that would be strong on identity asset management to support their robust security strategy. Watch this video and discover how Commercial International Bank of Egypt is now using a Zero Trust approach.

Zero Trust Changes Security From Something You Do to Something You Have

Zero Trust isn't something you can buy or implement. It's a philosophy and a strategy. That's why successful companies are looking to IBM's innovative approach to the Zero Trust framework to protect their businesses. IBM's approach is underpinned with multi-faceted security integrated tightly into the daily operations of business, providing ambient protection of both users and data. Read this blog to learn more about IBM's Zero Trust framework and how it can improve your business's IT security and protect and safeguard your intellectual property, customer data, and employee information. Read More...