- Risk Management What Cybersecurity Can Learn from NYC Restaurant Inspections
When letter grades are visible at the moment of decision, businesses improve their practices, with NYC restaurants raising their sanitation scores 35% within three years. The U.S. Cyber Trust Mark is...
- Malware Malvertising: How Malicious Ads Are Deployed
Attackers deploy malvertisements by compromising ad network infrastructure or by impersonating agencies representing legitimate clients. They sound professional, pay for campaigns, and sometimes...
- Risk Management Cyber Warfare Encompasses Only Some Security Concerns
Cyberwar discussions focus on mega breaches, but thousands of small breaches occur hourly and may exceed economic losses of high-profile incidents. Military cyber capabilities don't help civilian...
- Risk Management Shrinking vs. Slicing the Pie of Online and Computer Crime
Most security defenses "slice the pie"—making your target less attractive shifts attackers elsewhere without reducing overall crime. "Shrinking the pie" requires disrupting the ecosystem: stronger...
- Risk Management The Role of Rituals in Information Security
Security practices often function as rituals—painstaking steps we follow out of habit that provide a sense of control. Rituals reduce stress by overloading working memory, blocking intrusive...
- Tools Analyze Memory of an Infected System With Mandiant's Redline
Mandiant's free Redline tool triages potentially compromised hosts through live memory analysis, replacing Audit Viewer. It uses Memoryze to capture memory, assigns Malware Risk Index scores using...