Archive for 'Security Tools' Category
Autopsy of the SolarWinds Hack Update
A Timeline Update as of 02/22/21 An update to our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We have decided to leave the original article as it was originally posted and to update this post with any changes that have been made. You can see […]
Autopsy of the SolarWinds Hack
A Timeline as of 01/24/2021 Our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We are leaving this article as is, but for any updates to the timeline, check the Autopsy of the SolarWinds Hack Timeline Update article! – Vigilize Introduction: As the managing […]
State Law Inventory
An Assist for Your Incident Response Team . . . To be Used for Incidents! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I want to circle back around to an article written by Matt Jolley CISA, our resident researcher, who spent months compiling […]
FFIEC Emphasizes The Importance of Standardized Cybersecurity Assessments
These tools will help you assess and improve your cybersecurity preparedness… An article review. If you’re a regular reader of our blog, you know that we think cybersecurity training and the tools that go along with it are vitally important to any organization that relies upon computers—which is pretty much everyone, now. The Federal Financial […]
FTC Releases New Cybersecurity Guide
Focused on small businesses, the guide covers twelve topics you need to know to be secure… An article review. While there are many resources concerning cybersecurity out there, it can sometimes be difficult to find information tailored for smaller organizations instead of consumers or large enterprises. Luckily the FTC realizes that the bad guys aren’t […]
Cyber Challenge: A Community Bank Cyber Exercise
The FDIC has released new training material to help small banks start a discussion on risk… An article review. Sometimes it can be difficult to find a starting point when getting your employees discussing risk and technology, and while we do provide our own resources on the subject we wanted to pass along another resource […]
Equifax Ordered To Implement Security Measures
Financial regulators from eight states impose new rules in the wake of the credit reporting agency’s historic breach. An article review. The investigation by federal regulators and law enforcement officials into the breach that resulted in the release of over 140 million people’s personal information is still ongoing, but Equifax has already reached an agreement […]
Object Access Limitations
Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]
The Difference Between Patch and Vulnerability Management
The first in our guest author series, this article by Eric Kroeger and Jason Mikolanis explains the difference between patch and vulnerability management.
New York to Impose New Cybersecurity Regulations
The controversial new regulations are the first in the nation, and may not be the last… An article review. On March 1 New York State became the first in the nation to impose its own cybersecurity regulations on banking institutions. Though banking institutions have 180 days to come into compliance, there are complaints that the […]