Blog

Breaking Down a Few Cybersecurity Myths

Rebecca Skubish on Mar 5, 2019 10:52:50 AM

 

Cybersecurity Crisis Management (CCM) Considerations - A 7-Step Strategy

Geoff Stoker on Feb 26, 2019 9:03:00 AM

 

Does your organization have a stated cybersecurity crisis management (CCM) strategy? If you said “no,” then by implication your actual strategy is to rely on your team’s experiential-based gut..

Cybersecurity Risk & Fundamentals

Geoff Stoker on Feb 11, 2019 9:05:00 AM

 

On September 7, 2017, Equifax announced it had suffered a cybersecurity incident resulting in the download of millions of consumers’ personal information from mid-May through late July. Last..

Hope and Hype for Cybersecurity AI

Geoff Stoker on Feb 6, 2019 9:36:00 AM

 

Modern Artificial Intelligence (AI) research began soon after the end of WW II perhaps best indicated by Alan Turing’s 1950 question, “Can machines think?” Since then, while devoted researchers..

Major Vendors Dismissed Top Vulnerability for Malware Delivery

Paulo Shakarian on Feb 4, 2019 9:02:00 AM

Recent reporting by Cisco on information stealing malware  designed to hide from most anti-virus solutions  is leveraging Microsoft Office vulnerability CVE-2017–11882.

Does..

Training AI to Recognize Cyber Security Threats

Geoff Stoker on Jan 31, 2019 11:23:42 AM

 

Current Threats: Fileless Malware

Paulo Shakarian on Nov 5, 2018 9:30:10 PM

 

Fileless malware is on the rise and is enabling many attacks in 2018. While fileless techniques were prevalent in 2017, most of the more well-known attacks still accessed the disk and..

Five Questions to Ask a Cybersecurity Vendor

Paulo Shakarian on Oct 30, 2018 9:48:36 AM
 

Five questions to ask a cybersecurity vendor selling a machine learning solution

Ever since we started CYR3CON, we are continually surprised at the hype cycle surrounding..

Patching without Prioritization isn’t Working

Paulo Shakarian on Oct 23, 2018 9:34:13 AM

 

Detection dates and continued scanning don’t solve the root cause of the problem: how do you determine which CVEs are likely to be targeted and must be patched?

Recent media..

Breach disclosed by the Pentagon highlights the importance of third-party risk

Paulo Shakarian on Oct 17, 2018 2:33:04 PM

 

Late last week, the Associated Press reported that nearly 30,000 Department of Defense workers may have had Personally Identifying Information (PII) exposed due to a data..

Contact Us

Tempe, AZ 85280

Email: sales@cyr3con.ai
Phone: (833) 229-0110

Take the next step to be in the know, now.

Complete the form and a member of the CYR3CON team will contact you shortly to discuss your cyber security needs.