Cybersecurity blog

News, articles and thought leadership.

Stay up to date

CyberSecurity threats

An image of cybersecurity heroes in Hollywood.
Hollywood has a knack for dramatizing the digital battlefield. Let’s peel back the Hollywood façade and shine a light on what cybersecurity really looks like in the command centers of SOCs and CSIRTS.
A Cyber Security Incident Response Team is the emergency room of cybersecurity. You don’t want to need one, but once something bad happens, the ER doctors might just save your life. You don’t want to need critical incident response, but once a cyber incident occurs, you’ll be glad you have a team ready.
Prevention should be the holy grail of any cybersecurity strategy, but we know that 100% prevention is not realistic. So, what exactly happens when a serious threat is detected? Using a recent incident as an example, it is enlightening to follow the chain of events that starts when human SOC analysts decide that CSIRT action … Read more
Picture this: you are the CEO of a company that’s dealing with a ransomware attack and now you’re being told that, on top of dealing with your company being shut down for a number of days, you may also be facing fines. Not just your company, but you yourself as well, as you may be … Read more
An image of coins under the text 'How Zero Trust as a Service reduces the cost of a data breach'
Multiplying these factors gives a numerical depiction of risk, aiding in its prioritization and management. For instance, a high-impact but low-likelihood event might be deemed acceptable. Yet, an event with moderate impact and high likelihood could be perceived as riskier. Real-world risk assessment is, of course, more intricate than this formula alone. Variables, dependencies, and … Read more
Cyber Resielience
In the digital age, where the fabric of our interconnected world is woven with threads of data and technology, the imperative for cyber resilience has never been more urgent.

Zero Trust

The sudden and forced rise in working from home has created a lot of work for a large number of companies. It may have already slipped our minds, but suddenly, your entire company needed to be able to work remotely. This may have led to some problems. The thing is, many companies don’t stop to … Read more
The NSTAC and compliance are the big topics in part II of this interview with John Kindervag, done by VentureBeat. In part I of this interview, he touched upon topics such as ‘how do the organizations overcome barriers to adopting and implementing Zero Trust’ and dives deeper into how Zero Trust is a Strategy and … Read more
John Kindervag, founder of Zero Trust, was interviewed by VentureBeat to share his insights into how the adoption of Zero Trust is progressing across organizations and governments globally and what he sees as essential to its growth. He touches topics such as ‘how do the organizations overcome barriers to adopting and implementing Zero Trust’ and … Read more
The world of cybersecurity continues to have a battlefield littered with sucking chest wounds that go untreated. We are too passive. Too afraid of action. Too intimidated to do the right thing for our organization. There are a ton of excuses for this…
The increasing popularity of Zero Trust means that more and more is written about it. Unfortunately, the many online publications show that there are quite a few misgivings – and that not everyone understands what exactly is the purpose of Zero Trust.

Business & Technology

The MGM Resorts attack Hotel and entertainment giant MGM Resorts has been left dealing with serious consequences after a cyber-attack that kicked off with a fraudulent call to their service desk. The attack has reportedly led to outages of their internal networks, ATMs, slot machines, digital room key cards, and electronic payment systems. Even TV … Read more
Plano (US) – ON2IT, a leading provider of managed cybersecurity services, announces the addition of the CISA Zero Trust Maturity Model into its Zero Trust as a Service platform, AUXO™.  Organizations can use ON2IT’s Zero Trust as a Service platform to strengthen cyber defenses and easily embrace Zero Trust.  With cyber threat growth in volume … Read more
Why did Log4j have such an impact? But, although Log4j and follow-up attack vectors are still a real threat for many organizations, it’s certainly not too early to draw lessons learned from this episode. What made Log4j different from other ‘classic’ 2021 vulnerabilities such as Citrix, Kaseya, and Hafnium (Exchange) is the fact that it … Read more
They also know that, somewhere in the office, there is a supplies rack on which there is this nice cardboard box with product X. That nice cardboard box is there for one simple reason: to be able to affirmatively answer the question of “do you have checkbox alpha?”. However, it’s in a cardboax box on … Read more