Cytegic DyTA intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow a quick and understandable cyber-trend analysis. DyTA enables cyber-intelligence analysts and CISOs to understand and analyze the threat level of each attacker and attack method relevant to their organization, according to their geo-political region, industry
Category Archives: Blog
n light of the increasing volume and sophistication of cyber threats, organizations needs to identify their relevant risk, determine their cybersecurity posture and act upon it. That much is clear, but it is easier said than done. Organizations needs not only an agreed methodology to work by, but also a tool to help them achieve that goal and properly assess their threat landscape, control maturity and better prepare for the upcoming threats.
The FFIEC (Federal Financial Institutions Examination Council) has developed a Cybersecurity Assessment Tool, which was released on June 2015.
Threat Intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to offer a confusingly diverse array of threat intelligence products. Over the past 6 years threat intelligence has grown dramatically. Whether it has been its popularity in search
Introduction Partnering for Cyber Resilience was compiled by the World Economic Forum’s Partnering for Cyber Resilience ( the complete paper can be found here). This organization and its current initiative aim to establish awareness of cyber risk and to build commitment regarding the need for more rigorous approaches to cyber risk mitigation. The initiative started
Cybersecurity is no longer the sole responsibility of the technical people, or even the CIO. Following the Target breach (where immense pressure was placed to replace most of the board members after the breach), and board members of Target and Wyndham Worldwide (hotel chain) face derivative lawsuit related to the data breaches. Recent survey reveal
One in four Americans (25 percent) fell victim to information security breaches in the past year, according to a new survey from the AICPA conducted by Harris Poll. This represents a staggering growth from last year’s survey (about 11%)See- http://www.accountingtoday.com/blogs/accounting-tomorrow/news/one-in-four-americans-victims-of-information-security-breaches-survey-finds-74353-1.html And even more troubling figure is that 86 percent of adults reported some concern in
Israeli Regulator Directs Banks to focus on Cyber security management (a guest post by Anne F. La Lena)
Congratulations to David Zaken, Supervisor of Banks at the Bank of Israel, for wading in, no, for jumping in with both feet in potentially shark-infested waters of cyber regulation, with the recent issuance of “Directive 361”, Cyber-security Management, aimed at banks and credit card companies. (The original directive in Hebrew can found here: http://www.boi.org.il/he/BankingSupervision/SupervisorsDirectives/DocLib/361.pdf) The purpose
I’ve recently attended a cybersecurity conference. In addition to the industry regulars there were about 70 start up companies presenting in the start up pavilion. There was a definite division of technology among them- 80% dealt with detection (including mobile, SCADA/ ICS etc.) and the rest in various topics (DLP, MDM, management, intelligence etc.). This
There’s a deep problem in the Cybersecurity world, and it’s only getting worse. According to the 2015 Global Cybersecurity Status Report from industry association, ISACA, a huge 90% and 87% of US- and UK-based IT and security professionals respectively testified to there being an international shortage of skilled cyber-security professionals, with direct impact on these
This post is the complements the first part: http://www.cytegic.com/Blog/?p=134 Threats to cargo handling systems and terminal operation systems (TOS) On October 16, 2013, Europol announced it had exposed a network of drug traffickers who recruited hackers to breach IT systems in the port of Antwerp, Belgium. The purpose of the breach was to allow hackers to access
Cytegic DyTATM intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow a quick and understandable cyber-trend analysis. DyTATM enables cyber-intelligence analysts and CISOs to understand and analyze the threat level of each attacker and attack method relevant to their organization, according to their geo-political region, industry sector and corporate
The global shipping industry is the enabler of globalization itself. Without it, it would not have been possible for you to read this post (the smartphone or tablet you are reading this on was likely made in China and shipped to your location onboard a container ship), eat Sushi for lunch (frozen Salmon shipped from