Main Menu

In the News

How to Manage Your Vendors for Better Security

The recent ransomware attack on cloud hosting service iNSYNQ highlights an imperative element of cybersecurity that is often overlooked: vendor management. Read More.

Leading Malware Threats De-Weaponized Allowing Companies to Safely Test Network Security

HORNE Cyber today announced the release of Threat Runner, a revolutionary security product that, for the first time, safely emulates an authentic malware infection on your organization’s network, exposing vulnerabilities in need of remediation without encrypting files and sensitive data.  Read More.

Tips to Secure Your Sensitive Health Information: Mississippi Hospitals Magazine

In the clipboard of paperwork you fill out at a hospital or doctor’s office, you are guaranteed to come across a privacy form. Keeping patients’ information safe is a top priority for medical professionals. Still, the health care industry faces the same challenges as every other industry when it comes to ransomware attacks and data breaches. In this article, Partner in Charge Mike Skinner discusses tips for securing sensitive health information. Read More.

Horne Cyber debuts Threat Runner, a malware emulation tool

Horne Cyber has debuted a proprietary security product for its cybersecurity clients. Threat Runner emulates an authentic malware infection on an organization’s network, exposing vulnerabilities in need of remediation without encrypting files and sensitive data.
Read More.

Why Are Cybercriminals Targeting the Manufacturing Industry?

In the early days of cybercrime, cyberthieves were known to target companies with valuable financial data or mine social media accounts for personal details. But as technology continues to evolve, so do cybercriminals, and now the manufacturing industry has started to come under attack more frequently. HORNE Cyber's McGrew spoke with ThomasNet about why cybercriminals are targeting the manufacturing industry and steps to improve security posture. Read More.

Reverse engineering attacks: 6 tools your team needs to know

Director of Cyber Operations, Dr. Wesley McGrew, spoke with TechBeacon about the use of reverse-engineering of code by researchers to better understand malicious software. Read More.

How Riviera Beach left the door wide open for hackers

Last week, Riviera Beach, a small city of approximately 35,000 Floridians, authorized a $600,000 ransom payout to attackers in an unsuccessful attempt to regain access to its data. Due to interim leadership, outdated systems, and other factors, the city's network was left vulnerable to ransomware. HORNE Cyber's Director of Cyber Operations, Dr. Wesley McGrew, comments on the attack in a recent article from The Palm Beach Post. McGrew noted that "it's very rare that the value of the information exceeds the ransom itself." Read More.

How Riviera Beach left the door wide open for hackers

Last week, the city council of Riviera Beach, a small Florida city of about 35,000 residents, authorized a $600,000 ransom payout to attackers in an unsuccessful attempt to regain access to the city's data. Dr. Wesley McGrew, HORNE Cyber's Director of Cyber Operations, provides comments on the attack in The Palm Beach Post.  Read More.

Events