Let's Talk
Welcome to the Cygilant Blog

Black Hat Musings: Why Security Needs to Be On Your Radar

Posted by Security Steve on Sep 25, 2015

It’s time to start listening to your security people. Well, not just listening to them. Doing what they say because if you don’t, you’re going to get hacked. This year. And it’s not going to be their fault. It’s going to be yours.

Mad Hatter - Does It Make Sense To Hire A Hacker?

Posted by Security Steve on Aug 14, 2015


The Identity Theft Resource Center issues a weekly status update on the number of data breaches tear-to-date.  And it never ceases to surprise us with its ongoing tally of mayhem and misery. So, it might be wise to sit down as we tell you that the 2015 Breaches Identified by the ITRC as of July 21, 2015 are as follows: 436 total data breaches with a whopping 135 million records exposed. But what’s not surprising is the return of the great debate –should we take drastic measures to find out just how vulnerable we are? In these highly unsecured times, does it make sense to hire a hacker? 

Black Hat Survey Reveals IT Security Pros Concerns

Posted by Vijay Basani on Jul 22, 2015


Black Hat published their first attended research report, based on survey answers from nearly 500 seasoned IT security professionals who had attended Black Hat conferences in the past. The research study found that organizations for the most part businesses are not dedicating time, money, and other resources to the problems IT security professionals want to focus on to keep the organization secure.

Infected USB Firmware is Unstoppable

Posted by Vijay Basani on Aug 13, 2014


Researchers have found that USB devices such as thumb drives, keyboards, and mice, can be used to hack into personal computers in a new way, reported Reuters. Hackers can load malicious software onto the computer chips inside USB devices, said Karsten Nohl, the chief scientist at Security Research Labs in Berlin. The firmware in these controllers can be reprogrammed by cybercriminals. Before, people were wary of strange files on their USB’s memory – now they have to worry about malicious code inside the USB’s firmware.

10 Steps To Consider For Your Data Security Policy

Posted by Security Steve on Aug 11, 2014


There has been entirely too much press lately focused on the impact of IT security breaches. Ultimately you should revealuate your data security policy to see if it stacks up to industry standards so you won't be the next victim of this negative press. When formulating a data security policy it is important to look at all threats and to cover more than just the basics.

3 Topics of Discussion from the 2014 RSA Conference

Posted by Vijay Basani on Mar 5, 2014


This week, those of us in the security industry were busy attending the RSA conference, which was held February 24-28th in San Francisco, CA. Every year, the RSA conference brings together the industry’s best to discuss a wide variety of topics in the information security field. Attendees of the conference are there to learn more about IT securities most important current issues. As this industry continues to grow and grow, the RSA conference is a great way in which security experts across the globe can come together to connect and gain more insight into the issues facing the information security industry.

Subscribe to Email Updates

How Much Could You Save?

Find out now with our
60-second ROI calculator!

Calculate!

Posts by Topic

See All