Back to Main Navigation

PREDICT EXPLOITS

REDUCE COSTS

PREDICTION FOR THE CLOUD

ADVANCED CAPABILITIES

Back to Main Navigation

Resources

Predictive Threat Assessment Sign Up

Watch Now

PR1ORITY Product Demo
Back to Main Navigation

About CYR3CON

Come Join Us

CYR3CON is always looking for top talent to join our team.
View Openings
Back to Main Navigation

Take the next step to be in the know, now.

Complete the form and a member of the CYR3CON team will contact you shortly to discuss your cyber security needs.

Contact Form

Blog

Paulo Shakarian

Recent Posts

Video blog: The Basics on Vulnerability Prioritization

Paulo Shakarian on Apr 27, 2020 5:30:40 AM

 

Today’s video discusses the basics on vulnerability prioritization.  In it we discuss how mounting vulnerability disclosures – which averaged over 1,000 per month last year lead to a difficult..

Video blog: AI and Cyber Security

Paulo Shakarian on Apr 21, 2020 8:29:30 AM

 

CYR3CON CEO discusses AI and cybersecurity with former AT&T CISO Ed Amoroso, who now leads TAG Cyber.  Learn more about how AI can be properly leveraged in cybersecurity.

Three Key Lessons from the Binance Hack

Paulo Shakarian on May 21, 2019 8:54:12 AM

 

Major Vendors Dismissed Top Vulnerability for Malware Delivery

Paulo Shakarian on Feb 4, 2019 6:02:00 AM

Recent reporting by Cisco on information stealing malware  designed to hide from most anti-virus solutions  is leveraging Microsoft Office vulnerability CVE-2017–11882.

Does..

Current Threats: Fileless Malware

Paulo Shakarian on Nov 5, 2018 6:30:10 PM

 

Fileless malware is on the rise and is enabling many attacks in 2018. While fileless techniques were prevalent in 2017, most of the more well-known attacks still accessed the disk and..

Five Questions to Ask a Cybersecurity Vendor

Paulo Shakarian on Oct 30, 2018 6:48:36 AM
 

Five questions to ask a cybersecurity vendor selling a machine learning solution

Ever since we started CYR3CON, we are continually surprised at the hype cycle surrounding..

Patching without Prioritization isn’t Working

Paulo Shakarian on Oct 23, 2018 6:34:13 AM

 

Detection dates and continued scanning don’t solve the root cause of the problem: how do you determine which CVEs are likely to be targeted and must be patched?

Recent media..

Breach disclosed by the Pentagon highlights the importance of third-party risk

Paulo Shakarian on Oct 17, 2018 11:33:04 AM

 

Late last week, the Associated Press reported that nearly 30,000 Department of Defense workers may have had Personally Identifying Information (PII) exposed due to a data..

Current Threats: Cryptomining

Paulo Shakarian on Sep 26, 2018 11:29:40 AM

Several recent studies are telling us that illicit cryptomining is becoming a very large threat. This may leave many threat watchers wondering “what happened to ransomware”?..

Learning from NotPetya

Paulo Shakarian on Sep 26, 2018 11:29:22 AM