Gartner Advice on Defending Against 4 Attack Threats
This was taken from an article from Dark Reading, covering a recent Gartner Security & Risk Management Summit. Gartner experts were discussing how to defend against 4 main types of attack threats. (more…)
Verizon 2012 Data Breach Report
If you haven’t read the Verizon 2012 Data Breach Report, you may want to check it out. Contains a wealth of information on what’s going on in information security breaches. Here’s a link: (more…)
Security awareness training is more important than ever.
Can’t state it often enough – Cyber security awareness training is more important than ever. Many of the incidents we respond to are caused by malware being downloaded by users. Once it’s in your network, it’s only going to propagate. It’s like a bad roach infestation. (more…)
Cyber Attacks on our Critical Infrastructure
Recent article from Dark Reading, June 29: U.S. Critical Infrastructure Cyber Attack Reports Jump Dramatically. (more…)
You cannot see what you do not have
We see time and time again in our incident response practice department scenarios where long-term systemic malware resides in a seemingly secure environment for months at a time. (more…)
Incident Response Readiness-Ready for a breach?
Incident Response Readiness – Is your organization ready for a breach? Have you ever undergone a breach? Is there a breach going on right now? Or, ahem… have you undergone a breach and were not even aware that it occurred? Yikes… (more…)
Incident Response Readiness
An offering of ours, Incident Response Readiness, I think, is going to see a lot more attention in the coming year. Already noticing it. (more…)
Incident Response — The Changing Face of Malware
When someone says “you have malware”, what do you think of? Do you remember the “old days” when a virus was simply an annoyance, blue screening Windows machines, slowing your machine speed, or popping up false firewall advertisements? Unfortunately, those “old days” are long gone. Malware has changed drastically in recent years. (more…)
Forensic Analysis
We get calls for forensic analysis and investigation for a variety of reasons. Sometimes it’s a breach and the client wants to find out how bad the damage was, if anything was taken, if there’s any leave behind like malware, etc. Sometimes it’s an internal investigation on an employee for suspected theft or for breaking a company policy. (more…)
Network Security Engineering Services
One of the things that makes HALOCK a hybrid services firm is our unique practice groups, plus we bring to the table skill sets ranging from governance and strategy, PCI QSA knowledge, assessments and compliance, security solutions, and very seasoned network security engineering services. (more…)