Archives -

29
Apr

Assured Enterprises Adds Martin Graham to Board of Advisors

Vienna, Virginia (April 28, 2020) – Assured Enterprises (www.assured.enterprises), a leading innovator in advanced cybersecurity solutions, products and services, announced the addition of Martin Graham to its Board of Advisors. Mr. Graham, a well-known leader in financial markets and governance of financial exchanges, is recognized as a global champion of intelligent regulation and sound corporate …

3
Feb

Why MSPs Need Robust Cybersecurity Partners

If you’re a Managed Service Provider (MSP), hackers are looking for ways to get into your systems right now. In fact, it’s not unlikely that a bad actor — or two — has already made their way into your network. They’re in there – waiting for the right time to launch their attack. Inside, collecting …

13
Jan

Tensions with Iran Warrant Cybersecuirty Action from American Businesses

You’ve heard a lot about what the rising tensions with Iran might mean for your company. When the analysts talk about the growing Iran conflict, they almost always include cybersecurity. And they’re right. Iran has a long history of increasingly sophisticated cyber-attacks that target businesses with national security and public welfare implications. But while these …

21
Oct

Cities Under Siege

Late last month Click2Gov was breached – again. Click2Gov processes the utility bills of local governments in all 50 states. In 2017 and again in 2018, the company saw 300,000 of its clients’ credit cards compromised by hackers entering their system. This time, 8 cities in 5 different states were breached. This breach compromised sensitive …

26
Sep

Emotet Malware Attacks Government Contractor

Emotet Malware Attacks Government Contractor The Miracle Systems breach reemphasizes the need for comprehensive cyber risk management and mitigation throughout the defense supply chain. The breach, first reported by KrebsonSecurity, was caused by the Emotet malware strain and compromised information on at least eight internal systems at Miracle Systems. While any company breach is significant, …

13
Jan

The New Social Contract in Cybersecurity

The New Social Contract in Cybersecurity: It’s Just Around the Corner By Steve Soble The Eighteenth Century was marked by two revolutions that destroyed the power of the leader to legislate—The French Revolution and The American Revolution. The Twenty-First Century is comfortably home to The Digital Revolution, which seems to be changing everything—self-driving vehicles, AI …

28
Nov

Lord Daniel Brennan QC Joins Board of Advisors

One of the UK’s foremost voices on homeland security and the role of law in modern society, Lord Daniel Brennan QC, has joined the Board of Advisors of Assured Enterprises, Inc., a US-based cybersecurity company, providing innovative solutions to major corporations, Departments of Defense and medium-sized businesses.

16
Nov

Cybersecurity Secrets Unveiled for the Insurance World

What we seem to know is that the cyber-attack against Equifax arose from the exploit of a Known Vulnerability, which Equifax failed to patch. The patch was released on March 8. The cyber-attack continued undetected and unimpeded for months, until discovered at the end of July. Then, for murky reasons, Equifax did nothing until September 7, when it notified authorities and the public of the massive data breach. The CEO has been forced out. The head of IT is gone. And so, too, other executives. In the media and before Congress, Equifax has floated several justifications.

17
Oct

NYDFS Cyber Regulations: Frameworking Compliance

By now, we should all be aware of the sweeping cybersecurity compliance regulations passed by the NYS Department of Financial Services. The risks of non-compliance are stern—fines, potential criminal penalties, injury to reputation, loss of reputation and clients, not to mention public ridicule. It’s important to recognize the minimal requirements, when they are required and what might be practically recommended.

8
Sep

Cybersecurity Secrets Revealed

What exactly is a software vulnerability and how do you find it? In common usage, a vulnerability is a weakness, a corner of our emotional life susceptible to a minor hurt. Vulnerabilities in deployed software are the genuine Achilles heel of our digital systems today—networks, computers, mobile devices, biometrics, even the Internet of Things (IoT).

Page 1 of 3