Request a Demo
Cygilant Blog

Credit Unions: How to Prepare for the ACET with Security as a Service

Posted by Jeff Pappert on Sep 17, 2019

No doubt every credit union will have heard of the Automated Cybersecurity Examination Tool (ACET). It’s the latest compliance requirement aiming to provide a repeatable, measurable and transparent process that improves and standardizes supervision related to cybersecurity in all federally insured credit unions. A Cybersecurity Agency delivering Security-as-a-Service can help credit unions with the people and repeatable process to meet ACET requirements.

Credential Stuffing

Posted by Cygilant on Apr 22, 2019

How to Protect Against Credential Stuffing Attacks

It’s impossible to miss the reports of massive, high-profile data breaches. Adobe, Ancestry, Bitly, Comcast, Dropbox, Equifax, Google+, Marriott Starwood, T-Mobile, Ticketfly, LinkedIn, Yahoo and many other companies have leaked massive amounts of personal information, such as user names and passwords. But you may not be aware of what happens to this data after it’s been stolen.

Cybercriminals often purchase stolen data on the Dark Web. For example, on February 17, 2019, a hacker going by the name Gnosticplayers put eight hacked databases containing data for 92.75 million users on sale for 2.6249 bitcoins (about $9,300) on the Dark Web Marketplace known as Dream Market. Previously, the same hacker had posted a batch of 16 databases containing data for 620 million users and another batch of eight databases with data from 127 million users.

NYDFS - Are You Prepared to Comply with All 4 Phases?

Posted by Cygilant on Apr 1, 2019

How Security-as-a-Service gives you a leg up in developing a comprehensive cybersecurity plan

If you’re one of the thousands of banks, mortgage companies, insurers and other financial service firms that do business in the state of New York, your deadline to complete the final phase of compliance with the New York Department of Financial Services (NYDFS) Cybersecurity Regulation is upon you.  

On March 1, 2019, you are required to ensure that third-parties who access your customers’ private data have security protections in place. This measure comes on the heels of three previous sets of requirements, rolled out in phases beginning in March of 2017, designed to address today’s increasingly sophisticated cybersecurity threats.

4 Things to Look for in a Patch Management Solution

Posted by Trevan Marden on Aug 3, 2018

We’ve seen all too often that the cause of the major breaches we see in the news is failure by the organization to patch a software vulnerability for which a patch has long been available. As a result, more and more organizations are looking for solutions that help make the process of identifying and deploying patches easier and more automated. If you’re looking for a solution for patch management, here are four things to consider:

Blackhat 2018: What to Expect

Posted by Jack Gill on Jul 20, 2018

With Black Hat USA  2018 coming up in a few short weeks, it seems like a good time to unpack the results of their 2018 USA Attendance Survey. The survey was distributed to anyone who either attended the 2017 conference or expressed interest in visiting the 2018 session. The report covers topics from updated office policies on Facebook use to approval of President Trump, and these are what we at Cygilant thought were the most important. We are most interested to know how information security professionals are spending their time and what they’re not looking forward to combating in the next year.

Cybersecurity Hiring and Skills Gap is Still a Challenge

Posted by Trevan Marden on Jul 18, 2018

A report from Gartner announced this week on DarkReading found that nearly one out of three companies don’t have on-staff cybersecurity expertise. Gartner research director Rob McMillan and principal research analyst Sam Olyaei compiled the 2018 CIO Agenda Survey from over 3,000 respondents the article said. And while more organizations have cybersecurity staff than previous years, one third are still lacking a dedicated resource.

WPA3 Is Coming. How Should Your Security Program Change?

Posted by Trevan Marden on Jul 3, 2018

By now, you’ve likely heard that the next wireless security protocol has been announced by the Wi-Fi Alliance. WPA3, builds on previous Wi-fi Protected access standards and is designed to address issues with encryption in the previous standard (such as the KRACK exploit on WPA2 revealed late last year). The new standard will utilize 192-bitencrpytion and Opportunistic Wireless Encryption (OWE) which will ensure communications between router and device each use their own encryption keys, rather than sharing data. There are also new protections against dictionary attacks. The standard is not likely to be broadly adopted until 2019 and may require new hardware if updated firmware is not issued for existing devices.

What to Know About FFIEC Compliance

Posted by Trevan Marden on May 18, 2018

The Federal Financial Institutions Examination Council (FFIEC) provides cybersecurity standards and auditing for financial institutions and regulatory bodies including: The Board of Governors of the Federal Reserve System (FRB), the Federal Deposit Insurance Corporation (FDIC), the National Credit Union Administration (NCUA), the Office of the Comptroller of the Currency (OCC), and the Consumer Financial Protection Bureau (CFPB).

Automation Can’t Replace Role of People in Security

Posted by Trevan Marden on May 8, 2018

This week, an article on DarkReading served as a good reminder that technology alone can only take us so far in the fight against cyber threats. The role of trained security staff cannot be simply replaced by automation.

Increase ROI with Managed Security Services

Posted by Trevan Marden on Apr 6, 2018

When resources are unlimited, you can afford wasteful spending. But for most organizations with limited IT budgets and too few staff, it’s important to invest your security spend wisely. This means finding the ways to stretch your dollar further and get better value out of your investments. You can’t afford to waste money on solutions that are never deployed or require staff you don’t have to manage.

Most Recent Posts

Subscribe to Email Updates