Blog

Identify and Mitigate Systemic Cyber Threat

Paulo Shakarian on Jun 1, 2020 6:11:29 AM

 

For CISO’s responsible for a portfolio of companies – whether at a private equity firm, holding company, or even just a large firm with multiple business units, understanding cyber threats that..

COVID-19 Part 4 – Virus-Inspired Novelty

Geoff Stoker on May 11, 2020 7:51:02 AM

 

The novel coronavirus SARS-CoV-2 (COVID-19) has sparked creativity in many people, like the folks in Spain associated with the OxyGEN project who rapidly prototyped an automatic ventilator using..

COVID-19 Part 3 - Web Application Vulnerabilities

Geoff Stoker on May 4, 2020 7:17:09 AM

 

With state government stay-at-home orders pushing more people online, bad actors are increasingly interested in and increasing their use of web shell malware.

Video blog: The Basics on Vulnerability Prioritization

Paulo Shakarian on Apr 27, 2020 5:30:40 AM

 

Today’s video discusses the basics on vulnerability prioritization.  In it we discuss how mounting vulnerability disclosures – which averaged over 1,000 per month last year lead to a difficult..

COVID-19 Part 2 - VPN Risks

Geoff Stoker on Apr 13, 2020 9:36:55 AM

 

Meddling in Elections - The Case of Russian Attackers

Liisa Past and Alexander Grimm on Apr 3, 2019 1:03:47 PM

 Ukraine has proven to be a testing ground for Russian aggression in cyberspace.

Cybersecurity Risk & Fundamentals

Geoff Stoker on Feb 11, 2019 6:05:00 AM

 

On September 7, 2017, Equifax announced it had suffered a cybersecurity incident resulting in the download of millions of consumers’ personal information from mid-May through late July. Last..

Artificial Intelligence Gives Clues About Cyberattack Targets

Rebecca Skubish on Nov 9, 2018 11:24:37 AM

Why the new Apache Struts Vulnerability will be Targeted

Paulo Shakarian on Aug 27, 2018 4:04:39 PM

Last week, a new Apache Struts vulnerability was announced (CVE-2018–11776). So the big question becomes when an exploit will become more fully weaponized. The other day, a proof-of-concept exploit

Contact Us

Tempe, AZ 85280

Email: sales@cyr3con.ai
Phone: (833) 229-0110

Take the next step to be in the know, now.

Complete the form and a member of the CYR3CON team will contact you shortly to discuss your cyber security needs.