Adam Byars

Find me on:

Recent Posts

The Million-Dollar Insider Threat: Exposed

Posted by Adam Byars on Nov 21, 2016 10:09:08 AM

PAMDFARSReq_Blog_Post.jpg

The threat posed by someone inside an organization is often overlooked and poses the highest risk. A survey from SANS found nearly a third of organizations have no capability to prevent or mitigate an insider attack or incident, while over a third estimated the potential loss from an insider threat to be over $1 million, before including the immeasurable damage to brand and reputation. Overall, the survey identified there is a positive trend of organizations starting to recognize the risks posed by insider threats but organizations are struggling to deal with them.

 

Read More

Topics: Insider Threat, Risk, Exposed

Bad Security Habits Persist, Despite Rising Awareness: 2016 CyberArk Study

Posted by Adam Byars on Oct 18, 2016 9:35:28 AM

2016_Myths_That_Wont_Fly_Blog_Post.jpg

Read More

Topics: CyberArk, cybersecurity

How to Hack a Locked Windows or Mac OS X machine: Simple Vulnerability Exposed

Posted by Adam Byars on Oct 13, 2016 12:46:22 PM

iStock_77401293_LARGE.jpg

Hacking into a locked Windows or Mac computer should not be this simple, and yet it is. A security design flaw was recently exposed that shows a PC or Mac that is logged in but locked can have the login credentials stolen. The hack takes an average of 13 seconds and the credentials can then be used to compromise all other accounts sharing those credentials. Here’s how it works and what it means for your enterprise.

Read More

Topics: Security

New NERC-CIP Security Standards: Focus on Supply Chain Risks

Posted by Adam Byars on Sep 22, 2016 9:53:11 AM

Erics_4PrioritiesforCybersecurity_Blog_Post.jpg

On July 21, 2016 the North American Electric Regulatory Commission (NERC) was given a directive to develop new risk management standards aimed at addressing risks to the information systems in the supply chain of electric system assets. The new standards will cover risks related to remote vendor access, software integrity and authenticity, vendor risk management, procurement controls, and more.

Read More

Topics: nerc-cip

SMS Authentication Is Not Secure: German Hackers Spy On US Congressman

Posted by Adam Byars on Aug 30, 2016 9:45:15 AM

Erics_2_Essential_Security_Program_Elements_Blog_Post.jpg

 

Serious concerns about potential security flaws in the current global cellular network have been suspected for several years, but have been mostly disregarded as theoretical. In February 2014, suspicions grew significantly when a phone call by a US Ambassador was mysteriously leaked onto YouTube, believed to have been intercepted by someone using the suspected flaws in Russia. Since then, security research teams have confirmed the flaws are very real and made their findings public but have gotten relatively little attention, like the study released in February by AdaptiveMobile.

Read More

Easier and Faster Two-Factor Authentication from Google: How to Enable Google Prompt

Posted by Adam Byars on Aug 17, 2016 12:33:17 PM

Risk_Register_Blog_Post.jpg

Two-factor authentication is an immensely more secure option for securing your accounts than just using a password. The process has typically been as simple as putting in a spontaneously generated code that is provided to you via an app or SMS, in addition to your password. The extra time that it takes to fetch and type in the generated codes ensures that your account stays secure even if your password is compromised, offering an extra layer of account security. The extra time is also why astoundingly few people take advantage of two-factor authentication.

Read More

Topics: cybersecurity

The Power of High Cyber Security Confidence: What High-Performing Organizations Understand

Posted by Adam Byars on Jul 27, 2016 1:02:45 PM

Erics_2_Essential_Security_Program_Elements_Blog_Post.jpg

Cyber security has historically been viewed as something you HAVE to pay for, not want to. This way of thinking is outdated today. Highly successful organizations today understand that confidence in their cyber security is what enables them to grow boldly in today’s world. Confidence in cyber security as a foundation for success is still not often talked about at the executive leadership level. The following are three core values that today’s high-performing organizations understand:

Read More

Topics: cybersecurity

What CEOs Don’t Know About Cyber Security: Study from CyberArk

Posted by Adam Byars on Jul 5, 2016 4:08:48 PM

PAMDFARSReq_Blog_Post.jpg

A recent global study shed light on the current gap between executives and their organization’s security. The study, conducted by Dimensional Research (commissioned for a project by CyberArk), surveyed the opinions of 308 IT security professionals worldwide and captured hard data on enterprise security awareness at the executive level. While more and more organizations are quickly increasing their focus on security to stay out of today’s almost weekly headlines of multimillion-dollar security breaches and lawsuits, this study shows executives in general are far behind the curve. Here are some highlights from the study:

Read More

Topics: CyberArk