Author: Brian Lee Coday (Brian Lee Coday)

Home / Brian Lee Coday

Winning the CyberSecurity Game

Admittedly, most IT professionals would not characterize the threat and consequences of cyberattack as a ‘game’. To most, it is best characterized as a ‘war’. But “that’s not exactly right” writes Martin Barrett in a recent article on the SecurityIntelligence website. He makes a good case – though many of us IN the game aren’t...


How To Invest Your CyberSecurity Budget

Great article for all of us that make difficult decisions on how to invest limited resources available for cybersecurity.  To summarize, tech author Giulio D’Agostino writes that the top three priorities should be: 1. Visibility – being able to visualize your entire network quickly and easily can highlight areas of vulnerability and allow you to focus resources strategically....


Top Security Mistakes Putting Your Company at Risk

Cybersecurity is more painful to manage as technology architectures become more complex. Simplify your approach by avoiding these major security mistakes. In the online version of InformationWeek, Lisa Morgan discusses the top 8 cybersecurity mistakes that MANY organizations make that put them at risk of cyber attack. She asserts, and we agree, that companies need...


FBI issues specific warning of pending attack

“ATM Cash Out” operations hinges of massive phishing operation Fortune Magazine and KrebsOnSecurity detail warnings issued by the FBI of a pending “ATM Cash Out” attack. Highly organized crime operations are poised to execute a worldwide attack across small to medium sized banking operations. Generally, these operations have limited security controls to detect intrusions and...


World-Class Breach Detection

Powerfully simple threat hunting software. Easily identify and investigate hidden threats within your network. Infocyte HUNT® automates and simplifies threat hunting — traditionally, a specialized knowledge and services-heavy process — making it easier for security teams to investigate threats capable of evading your cybersecurity defenses and helping you mitigate the breach detection gap. Most vulnerabilities...


ALERT: Fax Machines Targeted By Hackers

Hackers are targeting your old fax machines, Israeli cybersecurity firm warns Check Point: Security flaws in 45 million business fax machines worldwide could be used as a backdoor into otherwise protected networks LONDON (AP) — What could be less threatening than the old office fax machine? Nothing. That’s precisely why it’s used as a backdoor...


Penetration Testing vs. Vulnerability Scanning

I often see promotional emails offering penetration testing for a ridiculously low price. This should be a red flag to anyone that receives something like this. What they are actually selling is usually a vulnerability assessment and that is quite a different thing than a true penetration test! It is not uncommon for someone in...

  • 1
  • 2