MAD Security Blog
Find the most up-to-date trends, insights, and information on the cybersecurity industry right here.Capital One Data Breach
By: Montgomery Steen, Security Analyst, MAD Security | August 7, 2019 Overview: Capital One has disclosed that a March 22-23 breach affected 100 million people in the US and a further 6 million in Canada. According to an indictment by the FBI, a software engineer in...
read moreThe Future of DFARs – Maturity and Accreditation
By: Dave Stewart, Director of Governance, Risk, & Compliance (GRC), MAD Security | July 9, 2019 For several years, the DFARS regulation and the associated NIST SP 800-171 security controls have been a bane of existence for many DoD contractors. From not having a clear...
read moreCyber Security Impacts of Financial Institution Organic Growth Strategies
By: Alex Shanteau, Security Engineer, MAD Security | June 27, 2019 When assessing growth strategies, it’s important to consider the security implications brought forth by them as they relate to your current security posture and business goals. In this blog, we will...
read moreNew Technology Implementations for Financial Institutions
Purchasing a new security solution can often turn the tide of battle in the defender’s favor, but there are many considerations before blindly buying into the latest and greatest technology. As you attempt to increase your security posture and build a successful cybersecurity program, be aware of the risks that come with implementing new technologies.
read moreMobile Security Defenses
Mobile devices have multiple points of attack just like any other environment. Setting a mobile device policy and enforcing security best practices with a mobile device manager can assist in reducing the overall attack surface for your business. Choosing an MDM with features that best fit a company’s needs is a great step in securing the mobile environment for their business.
read moreRansomware Defenses
Ransomware, like other malware, has many different strains, each of which can present different levels of risk. In this blog we will discuss technical defenses against ransomware.
read moreBest Practices for Managing Software Vulnerabilities
Software vulnerabilities won’t go away on their own, and if left unaddressed, the problem only compounds over time. A well implemented patch and vulnerability management program can remediate and detect patch-related vulnerabilities before an attacker is given a chance to abuse them.
read morePhishing Protections
Phishing attacks expend very little resources from attackers and are extremely effective. Users are generally the weakest link in the security of an organization and the path of least resistance for most attackers. Reducing the amount of phishing emails that reach your users is critical for decreasing the likelihood of a breach.
read more4 Common Cybersecurity Threats
In this blog post, we’ll take a look at some common threats you’re likely to see throughout 2019, and over the next several weeks we will go in-depth on prevention and mitigation of these types of attacks.
read moreThe Marriott Breach: Lessons Learned for the Hotel Industry
Marriott’s recent breach highlights some of the major challenges for the hotel industry surrounding cybersecurity and mergers and acquisitions. In this blog, we’ll discuss what exactly happened and what you can do to avoid such attacks.
read more