Main Menu
  • Filter:
image
Blog

Bipartisan Support for Increased Cybersecurity Focus

In a rarely glorified show of bipartisan support, the Senate recently introduced a bill to enhance Cybersecurity focus for public companies. U.S. Senators Jack Reed (D-RI), Susan Collins (R-ME), Mark...

image
Blog

Attack Surface Ep. 6: Cyber Assurance Industry Updates (FFIEC, SOC, NIST)

In recent months, there have been several updates and improvements to various cyber assurance frameworks. Leighton Foster, Operations Manager, sat down with Megan Hudson and Brad Aldridge, Cyber Assurance Managers, to discuss...

image
Blog

Cybersecurity in the City: What You Need to Know

Last week, HORNE Cyber, in partnership with Willis Towers Watson Nashville, hosted a cybersecurity seminar at the Franklin Marriott Cool Springs in Franklin, Tennessee. This seminar featured a unique series...

image
Blog

Attack Surface Ep. 5: What's Up with Ransomware and Cryptomining?

I was recently intrigued by the increased number of reported ransomware attacks on local governments. Since the start of the new year, cities such as Akron, Ohio and Sammamish, Washington...

image
Blog

How to know if you need Digital Forensics

For many, the thought of being a part of a digital forensics examination can be stressful and intimidating. But determining if you or your organization needs to initiate a digital...

image
Blog

What's Missing from Your Security Strategy?

I have seen that there’s often a flaw in logic with organizations when it comes to cybersecurity. The market has been flooded with products and services that “AUTOMAGICALLY” take care...

image
Blog

Attack Surface Episode 3: Reverse Engineering Ransomware

In our latest episode of Attack Surface, I sit down with Director of Cyber Operations, Wesley McGrew, to discuss reverse engineering ransomware. McGrew discusses the benefits of reverse engineering in...

image
Blog

Our 5 Most Read Blogs of 2018

As we transition into the new year, we look back at 2018… from previewing DEF CON and Black Hat USA talks to cryptocurrency mining and blockchain, our readers, clients, friends,...

image
Blog

Attack Surface Ep. 2: Predictions for 2019 Cybersecurity Trends

If you're curious about the changes in the threat landscape, organizational roles, and industry business models in the coming year - this episode was made for you. As 2018 comes...

image
Blog

Cybersecurity Lessons from WWII Propaganda

In honor of National Cybersecurity Awareness Month, let's look at how principles from World War II propaganda can teach us valuable lessons in the way we treat cybersecurity today....

image
Blog

Six Considerations for Purchasing Cyber Insurance

In our most recent blog, Brad Pierce discussed what a cyber insurance policy is not. It is not a savior in the wake of a data breach. It is not...

image
Blog

Attack Surface Ep. 1: Three Strategic Investments for Your IT Shop

Join HORNE Cyber’s marketing director, Ashley Madison, as she sits down with Mike Skinner and Brad Aldridge to discuss “Three Strategic Investments for Your IT Shop” on Episode 1 of...

image
Blog

What Cyber Insurance Is Not

The topic of cybersecurity insurance seems to be on the radar of most organizations I speak with. There are a lot of questions around how much coverage is needed and...

image
Blog

Developing an Incident Response Strategy: Preparing for the "What Ifs"

When we think about the impact of an unexpected event, it can often leave us with varying emotions. In many cases, those emotions are not pleasant… such as panic and...

image
Blog

Cybersecurity & Blockchain: What You Need To Know

If you have turned on the TV or been on the internet then most likely you have heard the term "Blockchain". As one of the hottest buzzwords in the tech...

image
Blog

Speaking in Vegas: DEF CON 26 & Black Hat USA 2018

Shot by Wesley McGrew in Las Vegas in 2017 The most important gathering of hackers and security professionals each year is held in the dry heat of Las Vegas’ summer....

image
Blog

Coping with Ransomware Fatigue

Ransomware attacks have increased in number and financial impact significantly. According to the FBI, the cost of ransomware attacks in the past few years has reached into billions of dollars,...

image
Blog

High Expectations for Service, With Reverse Engineering

A cornerstone of a cybersecurity firm is in their “reverse engineering” capability. It is a necessary part of responding to breaches, keeping up with the state-of-the-art in threats, and enhances...

image
Blog

Choosing the Right Security Option for Your Organization

Cybersecurity in layers has been the go-to security model for some time now. There’s no one solution that will properly secure your organization’s network and sensitive information. In today’s environment,...

image
Blog

The Cybersecurity Industry: Ignorance is Bliss

As I’ve pointed out before, the greatest threat to cyber security that organizations face today is the cybersecurity industry itself. I’ve long noticed that every business advisory firm in the...

image
Blog

Cybersecurity and Construction: Can a Breach Happen to Me?

As a contractor, if you think that cyber attacks “will never happen to me”, it’s time to reconsider your stance. Construction companies are an attractive target for a wide variety...

image
Blog

Why an Engaged C-Suite Matters in Improving Cyber Security

In a recent article, I talked about how the C-Suite can get past not being technical and take an offensive mindset to cyber security. I think the big message there...

image
Blog

Cyber Security Silver Bullet: If It Seems Too Good to be True, It Probably Is

I’ve said it before and I’ll keep on saying it: The greatest threat to cyber security could likely be the cyber security industry itself and the “good enough” mindset....

image
Blog

There’s Simply No Such Thing as “Good Enough” in Cyber Security

History tells us that there comes a time when almost every new innovative service starts to lose ground to a “good enough” competitor. In fact, many of the products that...

image
Blog

Don’t Let Cybersecurity Wag the Dog

When “the tail is wagging the dog”, you know that something has gone wrong. Priorities are not straight, and a part of the system does not understand its role. Providers...

image
Blog

Cyber Security for the Road Warrior

In my previous columns, I’ve been describing the benefits of having offense-oriented testing performed on your company’s network. This time around, I want to give some advice for the road...

image
Blog

Why "I'm Just Not Technical" is No Longer an Excuse in the C-Suite

I cannot tell you how many board presentations and meetings I have been in and heard "I am just not technical". Not being “tech savvy” is no longer a valid...

image
Blog

How Much Should You be Spending on Cybersecurity?

We often hear clients and prospective clients asking “how much should I be spending on cybersecurity?” That is a very complex question and one that is not easily answered without first...

image
Blog

Their Breach is Your Breach

When you’re catching up on the news, it’s become all too common to see stories about new breaches that have occurred, resulting in the theft of customers’ personal and financial...

image
Blog

Don't Let Cyber Risk Derail Your M&A Deal

Headlines around hacking and data breaches have become a regular occurrence over the last few years. When a business loses the trust of its customers, it can be nearly impossible...

image
Blog

You've Been Breached. Think It Won't Happen Again?

There’s a popular saying in the cybersecurity space, “There’s two types of organizations, those that have been breached and those that don’t know they’ve been breached.” In working with organizations...

image
Blog

The Victims of Cyber Security Training

It’s harder than you think to identify good talent in cyber security. Whether you’re trying to fill full-time security positions within your organization, or partner with service providers and vendors...

image
Blog

An Internet of Hackable “Things” Threatens Your Business

In this column, I try to avoid “buzz words” and jargon. Information security is complex enough without them. The security industry is overrun with companies that intend to confuse you...

image
Blog

Being a Compliant Victim of Cybercrime

When I discuss cybersecurity with business leaders, the most common misconception I see involves the role of security compliance. In my last column, I described the reality of cybercrime, a...

image
Blog

Why 2017 Could Be the Year of Cyber-Espionage

In this digital age where most businesses are focusing on the disrupt or be disrupted ethos, it seems that most are ignoring an even bigger trend that will affect their...

image
Blog

What Can the C-Suite Learn from the Latest Companies to Suffer Data Breaches?

2016 is ending with another round of major data breaches with online companies such as PayAsUGym, Lynda, and Yahoo....

image
Blog

The Reality of Cybercrime

Computer networks have given us the ability to operate, communicate, and conduct business more easily today than ever before. It is, however, hard to imagine a more dangerous time for...

image
Blog

What Should You Learn From Your Penetration Test?

Having a true advanced penetration test performed on your organization’s infrastructure is one of the fastest ways to gain valuable insight on the state of your security posture. It provides...

image
Blog

Staying Ahead of the Threat

Forrester Research released a report recently which predicted that our President-elect Donald Trump will face a major cyber crisis within the first 100 days of being president. Who knows if...

image
Blog

Hacking Healthcare: How to Offensively Protect Healthcare Systems

A breach of a healthcare provider can have a serious impact, both in terms of financial loss and patient confidence. HIPAA violations can involve fines of up to $50,000 per...

image
Blog

Size Doesn’t Matter to Cyber Criminals: 5 Tips for Securing Small to Mid-Sized Organizations

Data or access to another organization’s data is what makes a target attractive, not the size of the organization. We hear it over and over – “why would a hacker...

image
Blog

5 Cybersecurity Strategy Mistakes You Can’t Afford to Make

Read through your Twitter feed or turn on the news on any given day and one thing is evident: cyber attacks are happening in every industry and organization size. It...

image
Blog

Any Bitcoins in Your Wallet?

It doesn’t matter who you are, your position, or the size of the company you work for, you never want receive that phone call saying that your company has been...

image
Blog

5 Considerations for Protecting Your Employees, Customers and Data

With the rapid evolution of cloud based computing, many organizations face the fundamental question of whether or not they should employ third party solutions to facilitate convenience within their entity....

image
Blog

5 Considerations for Protecting Your Employees, Customers and Data

With the rapid evolution of cloud based computing, many organizations face the fundamental question of whether or not they should employ third party solutions to facilitate convenience within their entity....

image
Blog

Security Measures for Hostile Network Environments

While hacking and information security themed conferences such as DEF CON and Black Hat USA have a reputation of having hostile network environments with a large number of sophisticated attackers,...

image
Blog

Key Considerations When Purchasing Cyber Insurance

From both current and prospective cyber insurance policy holders, we are frequently asked about what should be considered when purchasing a policy—what terms should be included, what are the important...

image
Blog

Buying Your Own Stolen Data

I’m becoming very used to reading about the latest “ransomware” attacks each morning when I catch up on information security news over my first cup of coffee. Malicious software (malware)...

image
Blog

Modern Cyberattacks: Tradecraft on Your Network

At the Armed Forces Communications and Electronics Association’s Defensive Cyber Operations Symposium on April 20th, DISA Director LTG Alan R. Lynn described a shift in attackers’ operations. Lynn stated that...

image
Blog

When Was Your Last Information Security Check Up?

Maintaining information security today is, in many ways, similar to maintaining your personal health. Yearly check-ups and health screenings could detect a potential problem. If a problem is detected, more invasive procedures...

image
Infographic

Data is the New Currency

It’s not if a breach will occur, it’s when.  Where should you look for vulnerabilities?  What should you do?

image
Whitepaper

Cybersecurity Strategies

Manage your business risk.  Questions to ask and steps to take now.

image
Infographic

Cybersecurity Concerns For Executives & Boards

Executives and boards should take a proactive approach to cybersecurity. Here are are eight areas in which you should pay particular attention.

image
Video

Understanding Cyber Attacks

Organizations typically do not find a hacker on their network for 4-7 months. So, how do you identify an attack and effectively defend your organization?

image
Whitepaper

The Practical Guide to Security at Conferences

Conferences are Target-Rich Environments for Private and Nation-State Intelligence Gathering. 

image
Whitepaper

Attacker Looks at Docker: Approaching Multi-Container Applications

Director of Cyber Operations, Wesley McGrew, recently spoke at Black Hat USA 2018 and DEF CON 26 in Las Vegas. His topic provides hackers experienced in exploitation and post-exploitation of networks of systems with an exposure to containerization and the implications it has on offensive operations. 

image
Whitepaper

Cyber attack on City Hall, an ongoing trend

Dr. Wesley McGrew, Director of Cyber Operations, responds to the recent ransomware attack on the city of Del Rio, noting that the number of attacks occurring in the U.S. is nearly uncountable.