Main Menu
  • Filter:
image
Blog

All Things Secured: January Newsletter

Threat Runner Releases New Ryuk Ransomware Simulation "HORNE Cyber recently announced a major update to Threat Runner.Specifically, the team of reverse-engineering practitioners and software developers responsible for Threat Runner has added...

image
Blog

CISA Releases Insights on Increased Geopolitical Tensions and Threats

With heightened tensions and vowed threats of “revenge” from Iran, the CISA released insights into the potential for cyber and physical attacks against the United States. In a previous blog,...

image
Blog

The Case for Advanced Penetration Testing: Zero-Day Vulnerabilities in Symantec ICSP

Advanced Penetration Testing and Enhanced Red Teaming If you asked me what HORNE Cyber wants to be known for, I would quickly reply with “incomparable penetration testing.” From its conception,...

image
Blog

HORNE Cyber Recognized as one of the "Hot 150 Cybersecurity Companies to Watch in 2020"

We at HORNE Cyber are excited and very grateful to be recognized this week as one of the "Hot 150 Cybersecurity Companies to Watch in 2020" list, published by Cybercrime...

image
Blog

Cybersecurity Awareness Month Brief: Ransomware vs Everyone Else

This cybersecurity awareness month, we’re going to brief you on current hot topics in the cybersecurity space. This week, we’re talking ransomware. Chances are high that “ransomware” has been a...

image
Blog

Ransomware’s Newest Victim: Local Governments and Municipalities

Let’s face it - for many organizations, a ransomware attack is their worst nightmare. The very idea of having the most important files on a single computer encrypted and held...

image
Blog

Bipartisan Support for Increased Cybersecurity Focus

In a rarely glorified show of bipartisan support, the Senate recently introduced a bill to enhance Cybersecurity focus for public companies. U.S. Senators Jack Reed (D-RI), Susan Collins (R-ME), Mark...

image
Blog

Attack Surface Ep. 6: Cyber Assurance Industry Updates (FFIEC, SOC, NIST)

In recent months, there have been several updates and improvements to various cyber assurance frameworks. Leighton Foster, Operations Manager, sat down with Megan Hudson and Brad Aldridge, Cyber Assurance Managers, to discuss...

image
Blog

Cybersecurity in the City: What You Need to Know

Last week, HORNE Cyber, in partnership with Willis Towers Watson Nashville, hosted a cybersecurity seminar at the Franklin Marriott Cool Springs in Franklin, Tennessee. This seminar featured a unique series...

image
Blog

Attack Surface Ep. 5: What's Up with Ransomware and Cryptomining?

I was recently intrigued by the increased number of reported ransomware attacks on local governments. Since the start of the new year, cities such as Akron, Ohio and Sammamish, Washington...

image
Blog

How to know if you need Digital Forensics

For many, the thought of being a part of a digital forensics examination can be stressful and intimidating. But determining if you or your organization needs to initiate a digital...

image
Blog

Attack Surface Episode 3: Reverse Engineering Ransomware

In our latest episode of Attack Surface, I sit down with Director of Cyber Operations, Wesley McGrew, to discuss reverse engineering ransomware. McGrew discusses the benefits of reverse engineering in...

image
Blog

Our 5 Most Read Blogs of 2018

As we transition into the new year, we look back at 2018… from previewing DEF CON and Black Hat USA talks to cryptocurrency mining and blockchain, our readers, clients, friends,...

image
Blog

Attack Surface Ep. 2: Predictions for 2019 Cybersecurity Trends

If you're curious about the changes in the threat landscape, organizational roles, and industry business models in the coming year - this episode was made for you. As 2018 comes...

image
Blog

Attack Surface Ep. 1: Three Strategic Investments for Your IT Shop

Join HORNE Cyber’s marketing director, Ashley Madison, as she sits down with Mike Skinner and Brad Aldridge to discuss “Three Strategic Investments for Your IT Shop” on Episode 1 of...

image
Blog

What Cyber Insurance Is Not

The topic of cybersecurity insurance seems to be on the radar of most organizations I speak with. There are a lot of questions around how much coverage is needed and...

image
Blog

Cybersecurity & Blockchain: What You Need To Know

If you have turned on the TV or been on the internet then most likely you have heard the term "Blockchain". As one of the hottest buzzwords in the tech...

image
Blog

Speaking in Vegas: DEF CON 26 & Black Hat USA 2018

Shot by Wesley McGrew in Las Vegas in 2017 The most important gathering of hackers and security professionals each year is held in the dry heat of Las Vegas’ summer....

image
Blog

Coping with Ransomware Fatigue

Ransomware attacks have increased in number and financial impact significantly. According to the FBI, the cost of ransomware attacks in the past few years has reached into billions of dollars,...

image
Blog

High Expectations for Service, With Reverse Engineering

A cornerstone of a cybersecurity firm is in their “reverse engineering” capability. It is a necessary part of responding to breaches, keeping up with the state-of-the-art in threats, and enhances...

image
Blog

The Cybersecurity Industry: Ignorance is Bliss

As I’ve pointed out before, the greatest threat to cyber security that organizations face today is the cybersecurity industry itself. I’ve long noticed that every business advisory firm in the...

image
Blog

Cybersecurity and Construction: Can a Breach Happen to Me?

As a contractor, if you think that cyber attacks “will never happen to me”, it’s time to reconsider your stance. Construction companies are an attractive target for a wide variety...

image
Blog

Cyber Security Silver Bullet: If It Seems Too Good to be True, It Probably Is

I’ve said it before and I’ll keep on saying it: The greatest threat to cyber security could likely be the cyber security industry itself and the “good enough” mindset....

image
Blog

There’s Simply No Such Thing as “Good Enough” in Cyber Security

History tells us that there comes a time when almost every new innovative service starts to lose ground to a “good enough” competitor. In fact, many of the products that...

image
Blog

Don’t Let Cybersecurity Wag the Dog

When “the tail is wagging the dog”, you know that something has gone wrong. Priorities are not straight, and a part of the system does not understand its role. Providers...

image
Blog

You've Been Breached. Think It Won't Happen Again?

There’s a popular saying in the cybersecurity space, “There’s two types of organizations, those that have been breached and those that don’t know they’ve been breached.” In working with organizations...

image
Blog

The Victims of Cyber Security Training

It’s harder than you think to identify good talent in cyber security. Whether you’re trying to fill full-time security positions within your organization, or partner with service providers and vendors...

image
Blog

An Internet of Hackable “Things” Threatens Your Business

In this column, I try to avoid “buzz words” and jargon. Information security is complex enough without them. The security industry is overrun with companies that intend to confuse you...

image
Blog

Being a Compliant Victim of Cybercrime

When I discuss cybersecurity with business leaders, the most common misconception I see involves the role of security compliance. In my last column, I described the reality of cybercrime, a...

image
Blog

Why 2017 Could Be the Year of Cyber-Espionage

In this digital age where most businesses are focusing on the disrupt or be disrupted ethos, it seems that most are ignoring an even bigger trend that will affect their...

image
Blog

What Can the C-Suite Learn from the Latest Companies to Suffer Data Breaches?

2016 is ending with another round of major data breaches with online companies such as PayAsUGym, Lynda, and Yahoo....

image
Blog

The Reality of Cybercrime

Computer networks have given us the ability to operate, communicate, and conduct business more easily today than ever before. It is, however, hard to imagine a more dangerous time for...

image
Blog

Staying Ahead of the Threat

Forrester Research released a report recently which predicted that our President-elect Donald Trump will face a major cyber crisis within the first 100 days of being president. Who knows if...

image
Blog

Hacking Healthcare: How to Offensively Protect Healthcare Systems

A breach of a healthcare provider can have a serious impact, both in terms of financial loss and patient confidence. HIPAA violations can involve fines of up to $50,000 per...

image
Blog

Any Bitcoins in Your Wallet?

It doesn’t matter who you are, your position, or the size of the company you work for, you never want receive that phone call saying that your company has been...

image
Blog

5 Considerations for Protecting Your Employees, Customers and Data

With the rapid evolution of cloud based computing, many organizations face the fundamental question of whether or not they should employ third party solutions to facilitate convenience within their entity....

image
Blog

5 Considerations for Protecting Your Employees, Customers and Data

With the rapid evolution of cloud based computing, many organizations face the fundamental question of whether or not they should employ third party solutions to facilitate convenience within their entity....

image
Blog

Security Measures for Hostile Network Environments

While hacking and information security themed conferences such as DEF CON and Black Hat USA have a reputation of having hostile network environments with a large number of sophisticated attackers,...

image
Blog

Buying Your Own Stolen Data

I’m becoming very used to reading about the latest “ransomware” attacks each morning when I catch up on information security news over my first cup of coffee. Malicious software (malware)...

image
Blog

Modern Cyberattacks: Tradecraft on Your Network

At the Armed Forces Communications and Electronics Association’s Defensive Cyber Operations Symposium on April 20th, DISA Director LTG Alan R. Lynn described a shift in attackers’ operations. Lynn stated that...

image
Blog

When Was Your Last Information Security Check Up?

Maintaining information security today is, in many ways, similar to maintaining your personal health. Yearly check-ups and health screenings could detect a potential problem. If a problem is detected, more invasive procedures...

image
Blog

Inside a Hacker’s Mind

The old adage says, “it takes one to know one,” and we believe that is absolutely true when it comes to fighting cyber threats. Originally, hacker was a positive term...

image
Blog

Securely Integrating the Internet of Things

Last week, members of the security industry gathered for the annual RSA Conference to discuss the latest topics in information security, from the Apple vs. FBI encryption debate to the...

image
Blog

Build Better Legal Cases with Access to Digital Evidence

Attorneys are always looking for new forms of evidence for both criminal and civil matters. With the recent advances in digital forensic capabilities, many legal cases are incorporating digital evidence...

image
Blog

8 Cybersecurity Risks Executives Need to Know

No organization is immune to the threat of security breaches. With cybercrime activity increasing rapidly across the globe, every organization needs to address the potential risks to better protect its...

image
Blog

Vulnerability Scans and Pen Tests: What’s the Difference? Part 3

The Internet of Things Raises Risks Imagine if all of the multi-function printer units in your organization sent an electronic copy of every document that is scanned, copied, or printed...

image
Blog

Vulnerability Scans and Pen Tests: What’s the Difference? Part 2

As I mentioned in my previous post, there is much confusion in the cybersecurity market around vulnerability scans and penetration tests. The words are not interchangeable. They are very different...

image
Blog

Vulnerability Scans and Pen Tests: What’s the Difference? Part 1

When safeguarding an organization against the threat of cybercrime, it’s important to regularly test how well your current security measures are performing. I recommend that organizations apply a regular schedule...

image
Whitepaper

Cybersecurity Strategies

Manage your business risk.  Questions to ask and steps to take now.

image
Infographic

Cybersecurity Concerns For Executives & Boards

Executives and boards should take a proactive approach to cybersecurity. Here are are eight areas in which you should pay particular attention.

image
Video

Understanding Cyber Attacks

Organizations typically do not find a hacker on their network for 4-7 months. So, how do you identify an attack and effectively defend your organization?

image
Whitepaper

The Practical Guide to Security at Conferences

Conferences are Target-Rich Environments for Private and Nation-State Intelligence Gathering. 

image
Whitepaper

Attacker Looks at Docker: Approaching Multi-Container Applications

Director of Cyber Operations, Wesley McGrew, recently spoke at Black Hat USA 2018 and DEF CON 26 in Las Vegas. His topic provides hackers experienced in exploitation and post-exploitation of networks of systems with an exposure to containerization and the implications it has on offensive operations. 

image
Whitepaper

Cyber attack on City Hall, an ongoing trend

Dr. Wesley McGrew, Director of Cyber Operations, responds to the recent ransomware attack on the city of Del Rio, noting that the number of attacks occurring in the U.S. is nearly uncountable.