Cybersecurity News
ThreatLAB 2015 is coming! Save the Date.
Are you looking for a fun and interesting opportunity to network with experts from a wide variety of industries while learning about the multitude...
New Russian Boldness Revives a Cold War Tradition: Testing the Other Side
Secure Halo shared its thoughts on what Russia's potential motive was when they accessed White House computer systems, in an article for The ...
Why You Should Care That the White House Got Hacked
It is important to determine the objective of the White House breach in order to mitigate risk and prevent future breaches from occurring. Secure...
Consulting firm says insurers’ use of framework could spawn mandates
Cyber Security Business Doubles for London Insurer
Secure Halo worked with Miller Insurance Services LLP to "craft policies that will protect them in the event of a cyberattack, including coverage...
Dairy Queen Breach Shines Light On Impact Of 3rd-Party Breaches
It is essential for organizations to identify potential vulnerabilities created by relationships with third-parties. Despite having a mature cyber...
Feds Issue Red-Flag Advisory on Escalating Insider Threats
After the FBI and the Department of Homeland Security warned that there is a heightened risk of insider threats to organizations' cybersecurity,...
ISIS Cyber Threat To US Under Debate
After ISIS made threats to the US and its allies, their cyber capabilities came under debate. Read the opinions of industry experts, including...
Insider Threat Incidents Increasing at Businesses, Warns IC3
The FBI's Internet Crime Complaint Center (IC3) announced that organizations have suffered significant loss as a result of the involvement of...
Experts Doubt ISIS Could Launch Major Cyberattack Against the U.S.
ISIS has proven to be adept at using social media to its benefit, but it's doubtful that they are capable of launching a major cyberattack against...
What U.S. organizations should know about foreign state-sponsored cyberattacks
Sponsored cyberattacks are fast becoming the method of choice for foreign governments to infiltrate and steal information and intelligence from U.S....
How Insurers Can Protect Their Cyber Portfolios
Major breaches have led to discussions between organizations and their suppliers/partners regarding cyber risk, as well as the need for cyber...
The changing threat landscape: insider threats and state-sponsored attacks
If you aren’t one of the 4.5 million people who were directly affected by the Community Health Systems (CHS) Heartbleed data breach, then you’ve...
Reported breaches involving zero-day bug at JPMorgan Chase, other banks
After a breach at JPMorgan Chase -- and at least four other financial institutions -- Secure Halo explained the possible motivators for the attack,...
Small business advice: 5 low-cost, high-impact cybersecurity protection measures
There are several ways that organizations can take basic cybersecurity prevention measures without it costing a fortune. Check out Secure...
What Healthcare Should Learn from CHS’ Heartbleed Breach
Industry experts, including Secure Halo, weighed in on the Community Health Systems data breach and the need for security that goes beyond...
Agencies Stalk The Insider Threat
A mature cyber posture includes analyzing an organization from within, just as much as it does from setting up external security measures. Secure...
Nuclear Regulatory Commission Hacked Three Times
Secure Halo shared its thoughts on the likely purpose behind the Nuclear Regulatory Commission (NRC) attacks, who is possibly responsible, and the...
Help Employees Think on Their Feet
When employees don’t have enough information about projects or goals, the fog of indecision can settle in – people make the wrong decisions, or no...
Strengthening Enterprise Security with Cyber Assessments
Miller Insurance Services LLP uses Secure Halo's cyber assessment in order to mitigate risk and protect their assets from growing threats. Read More
Secure Halo Enhances Holistic Cyber Assessment to Improve Enterprise Security
Posture-based methodology transforms risk assessment for cyberinsurance, commercial enterprises and public sector Washington, D.C. - Secure Halo, an...
Proper Risk Assessment for Cyber Insurance
The introduction of cyberinsurance is tempered by the same legacy procedures that have defined insurance since long before cybersecurity existed....
Why Inaction is Worse Than Making a Mistake
Inactivity is an unacceptable practice when it comes to cybersecurity, which is why Secure Halo preaches a "Get off the X" mentality encouraging...
Implications of Smaller-Scale Data Breaches: Citigroup, 2013
Poor security – Citigroup, 2013 The personal information of 150,000 Citigroup clients who filed for bankruptcy between 2007 and 2011 was exposed...
Implications of Smaller-Scale Breaches: Policy and Procedure
Breaches aren’t always the work of external hackers or malicious insider threats. They are frequently the result of carelessness on the part of an...
Are your third-party vendors leaving the door open to hackers?
In every arena, smart enemies choose the path of least resistance. In the data security realm, that path increasingly goes through third-party...
Why Insider Threat Detection Fails
Virtually anyone who works in industry or government can tell you what the reportable warning signs of insider threat are – sudden behavioral...
Implications of smaller-scale breaches: The insider threat
Insiders have an advantage over outsiders with malicious intentions. Possessing the knowledge of a company’s physical and technical security...
Cybersecurity: ‘Best of Breed’ May Not Be Best for Small Businesses
There isn't a "one-size-fits-all" solution when it comes to cybersecurity, especially for small businesses with unique needs and specific resources....
Implications of Smaller-Scale Data Breaches (Pt. 1)
Unless you’ve been living under a rock, you’ve heard all about the massive Target data breach. After all, it’s hard not to take notice when the...
Get In Touch
962 Wayne Ave, #310
Silver Spring, MD 20910
(301) 304-1700 (Sales)
(202) 629-1960 (Office)
info@securehalo.com