DefenseStorm Blog
5,066 FOLLOWERS
Get the latest cyber security news and critical industry insights written by experts in DefenseStorm's Cybermind blog.
DefenseStorm Blog
2d ago
DefenseStorm Blog
1w ago
NIST’s Cybersecurity Framework (CSF) is designed to help institutions of all sizes and sophistication levels manage and reduce their unique cybersecurity risks. With the release of CSF 2.0, the guidance provided by NIST has expanded the practice and controls that institutions can use to best understand, assess, prioritize, and communicate its cybersecurity efforts ..read more
DefenseStorm Blog
2M ago
With election season beginning to ramp up, it’s important to be aware and prepared for the barrage of phishing, smishing, vishing, and other “ishing” scams and campaigns that are sure to follow. Just this weekend, I received multiple texts related to voting and polling, so let’s explore a few of the common scams and tactics that bad actors will try to leverage to obtain your personal information ..read more
DefenseStorm Blog
2M ago
With the rise of online dating and social media, millions of people flock to digital platforms to find love. But from behind the protection of a computer screen, scammers exploit the most vulnerable people seeking romance and relationships, ultimately leaving the unsuspecting victim with a broken heart and an empty bank account ..read more
DefenseStorm Blog
2M ago
Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. As investment from fast-moving threat actors continues to increase, traditional security practices are unable to keep up ..read more
DefenseStorm Blog
3M ago
DefenseStorm has recently updated its GRID Active Risk Assessment with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution with GRID Active Risk Assessment Exceptions ..read more
DefenseStorm Blog
3M ago
Technology is advancing at an unprecedented pace, and even the most tech-savvy individuals can find themselves in need of assistance to remain connected and productive. Unfortunately, with the increased demand for tech support comes a rise in fraudulent activity exploiting this important service. Senior citizens are the most vulnerable group because they are more likely to seek help in navigating the complexities of technology ..read more
DefenseStorm Blog
3M ago
DefenseStorm has recently updated its GRID Active Governance Program with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution. Organizations now can link dashboards to task schedules for scheduling and documenting report reviews ..read more
DefenseStorm Blog
4M ago
Insights from the desk of Chief Information Security Officer, William Wetherill ..read more
DefenseStorm Blog
4M ago
Apple just rolled out a new default feature for iPhone and Apple watch that allows nearby users to share contact information with one another. This feature has sparked some concern in online social communities and even prompted law enforcement agencies to release statements and privacy warnings over the last few days due to the concern that people could “drop” information on another user’s phone at random, which seems scary ..read more