Attending Black Hat USA this year? Visit us in booth #1747 and begin to realize more value out of your existing security tools.
Ken Westin

Ken Westin

Author's Posts

Hybrid Intelligence Needed to Thwart AI-Powered Attacks

Just like how defenders are leveraging AI elements such as machine learning and automation, adversaries are incorporating advanced techniques into their malicious activities. Hence the emergence of AI-powered attacks. Dubbed “one of the biggest fears within the security community” by Max Heinemeyerm Director of Threat Hunting at DarkTrace, AI-powered attacks leverage more offensive AI and […]

CIS Controls 1-2: Cybersecurity Begins with Knowing What You Have and What You Don’t Need

Organizations are struggling to identify and contain a breach. According to Security Intelligence, the average dwell time or “lifecycle” of an organization’s breach detection efforts was 280 days in 2020. This period played into the $3.86 million that organizations spent on average in their data breach recovery efforts for that year. Several factors can affect […]

The CIS Controls – An Overview of What They Are and What’s New in Version 8

The events of 2020 accelerated many organizations’ plans for digital transformation, compelling them to adopt cloud computing and virtualization in support of remote work. It appears that those changes will last long after 2020. In April 2020, for instance, Gartner revealed that 74% of CFOs and finance leaders intended to move at least 5% of previously on-site […]

Verizon 2021 Data Breach Investigations Report (DBIR): Ransomware Attacks Doubled 

If there is one lesson we can take away from 2020 is that we all need to be prepared for the worst. Resilience has emerged as the top skill that people and businesses need to possess not only to survive but also to thrive in a changing and challenging world.  Rapid changes require businesses to make rapid but well-informed […]

Proactive Practices to Mitigate the Misuse of Service Accounts

Service accounts, by design, are created to perform specific tasks for services running on endpoints. Depending on the service and how the service account is configured, service accounts can have a range of different privilege levels. Malicious actors understand that service accounts typically have higher privileges than normal user accounts, and often target these accounts […]