Category Archives: Blog

Comparison between 2014 and 2015 attacker types

tis the season to be hacking- Forecast for Cybercrime activities during the holidays

Cytegic DyTA intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow a quick and understandable cyber-trend analysis. DyTA enables cyber-intelligence analysts and CISOs to understand and analyze the threat level of each attacker and attack method relevant to their organization, according to their geo-political region, industry

Read More

Review of the new FFIEC Cybersecurity Assessment Tool

n light of the increasing volume and sophistication of cyber threats, organizations needs to identify their relevant risk, determine their cybersecurity posture and act upon it. That much is clear, but it is easier said than done. Organizations needs not only an agreed methodology to work by, but also a tool to help them achieve that goal and properly assess their threat landscape, control maturity and better prepare for the upcoming threats.
The FFIEC (Federal Financial Institutions Examination Council) has developed a Cybersecurity Assessment Tool, which was released on June 2015.

Threat Intelligence: Collecting, Analysing, Evaluating

Threat Intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to offer a confusingly diverse array of threat intelligence products. Over the past 6 years threat intelligence has grown dramatically. Whether it has been its popularity in search

Read More

Review: World Economic Forum’s Partnering for Cyber Resilience

Introduction Partnering for Cyber Resilience was compiled by the World Economic Forum’s Partnering for Cyber Resilience ( the complete paper can be found here). This organization and its current initiative aim to establish awareness of cyber risk and to build commitment regarding the need for more rigorous approaches to cyber risk mitigation. The initiative started

Read More

Are the directors on-board the cyber security train?

Cybersecurity is no longer the sole responsibility of the technical people, or even the CIO. Following the Target breach (where immense pressure was placed to replace most of the board members after the breach), and board members of Target and Wyndham Worldwide (hotel chain) face derivative lawsuit related to the data breaches. Recent survey reveal

Read More

Cybersecurity and corporate responsibility – It’s time for Regulators to put their foot down

One in four Americans (25 percent) fell victim to information security breaches in the past year, according to a new survey from the AICPA conducted by Harris Poll. This represents a staggering growth from last year’s survey (about 11%)See-  http://www.accountingtoday.com/blogs/accounting-tomorrow/news/one-in-four-americans-victims-of-information-security-breaches-survey-finds-74353-1.html And even more troubling figure is that 86 percent of adults reported some concern in

Read More

Israeli Regulator Directs Banks to focus on Cyber security management (a guest post by Anne F. La Lena)

Congratulations to David Zaken, Supervisor of Banks at the Bank of Israel, for wading in, no, for jumping in with both feet in potentially shark-infested waters of cyber regulation, with the recent issuance of “Directive 361”, Cyber-security Management, aimed at banks and credit card companies. (The original directive in Hebrew can found here: http://www.boi.org.il/he/BankingSupervision/SupervisorsDirectives/DocLib/361.pdf) The purpose

Read More

Cybersecurity management- it’s a numbers game

I’ve recently attended a cybersecurity conference. In addition to the industry regulars there were about 70 start up companies presenting in the start up pavilion. There was a definite division of technology among them- 80% dealt with detection (including mobile, SCADA/ ICS etc.) and the rest in various topics (DLP, MDM, management, intelligence etc.). This

Read More

Cytegic VP R&D, Ms. Keren Gaber at the womens-forum panel discussion about gender gap

Bridging the Cyber-security skills gap using the right technology

There’s a deep problem in the Cybersecurity world, and it’s only getting worse. According to the 2015 Global Cybersecurity Status Report from industry association, ISACA, a huge 90% and 87% of US- and UK-based IT and security professionals respectively testified to there being an international shortage of skilled cyber-security professionals, with direct impact on these

Read More

Managing the Cyber risk to the global shipping industry Part II

This post is the complements the first part: http://www.cytegic.com/Blog/?p=134 Threats to cargo handling systems and terminal operation systems (TOS) On October 16, 2013, Europol announced it had exposed a network of drug traffickers who recruited hackers to breach IT systems in the port of Antwerp, Belgium. The purpose of the breach was to allow hackers to access

Read More

Highlights from our monthly Big Data analysis report (Produced by DyTA)

Cytegic DyTATM intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow a quick and understandable cyber-trend analysis. DyTATM enables cyber-intelligence analysts and CISOs to understand and analyze the threat level of each attacker and attack method relevant to their organization, according to their geo-political region, industry sector and corporate

Read More