cybersecurityshawn.com

Shawn Maschino serves as the main contributor and editor at CybersecurityShawn.com. With over two decades of experience and a strong dedication to reshaping perceptions of cybersecurity in the business realm, the content presented on this website aims to bolster and stimulate businesses in enhancing their cybersecurity strategies and fostering meaningful discussions on the subject.

Here Phishy Phishy Phishy – How To Address Phishing in 2023

One frustrating aspect of email phishing is the frequency with which scammers fall back on tried-and-true methods that really have no business working these days. Like attaching a phishing email to a traditional, clean email message, or leveraging link redirects on LinkedIn, or abusing an encoding method that makes it easy to disguise booby-trapped Microsoft Windows files as relatively harmless documents.

Here Phishy Phishy Phishy – How To Address Phishing in 2023 Read More »

Analysis: Critical Care in Crisis – Ransomware in the Medical Sector

Prospect Medical Holdings, the parent company of Eastern Connecticut Health Network and Waterbury HEALTH, recently experienced a major ransomware attack that impacted all its facilities. As a result, emergency room services had to be diverted, and manual record maintenance became necessary. The FBI is currently investigating the cyber attacks, and the hackers’ ransom demands remain unclear. This article will provide an assessment of the situation from a cybersecurity architect perspective, and highlight lessons that businesses can learn to address similar challenges.

Analysis: Critical Care in Crisis – Ransomware in the Medical Sector Read More »

Rust in Peace – A Better Programming Language (From A Cybersecurity Perspective)

The Rust programming language continues to gain popularity among developers and companies focused on secure code. Both Google and Microsoft have embraced Rust as a way to improve security and eliminate vulnerabilities. Rust’s memory safety features and performance benefits have made it an attractive choice for organizations looking to enhance their security posture. This article explores the experiences of Fortanix, Microsoft, and Google with Rust, along with lessons learned that businesses can apply to their own cybersecurity challenges.

Rust in Peace – A Better Programming Language (From A Cybersecurity Perspective) Read More »

Risks and Challenges in Migrating to the Cloud: The Perils of a “Lift and Shift” Approach

Introduction: Cloud computing offers numerous benefits to businesses, from scalability and cost-efficiency to enhanced collaboration and flexibility. As organizations increasingly adopt cloud solutions, it is essential to understand the risks associated with migration, especially for those planning a “lift and shift” approach. This article will delve into the key risks and challenges involved in migrating […]

Risks and Challenges in Migrating to the Cloud: The Perils of a “Lift and Shift” Approach Read More »

Artificial Intelligence – “Chronic Risk” per UK – What It Means For You

In recent years, the advancement of artificial intelligence (AI) has been both remarkable and concerning. While AI has the potential to revolutionize various sectors and improve efficiency, cybersecurity experts have constantly highlighted the risks associated with its rapid adoption. The United Kingdom has recently joined the chorus, labeling AI as a “chronic risk” to its national security. This article explores the concerns raised by the UK and provides valuable lessons for businesses to consider in addressing similar challenges.

Artificial Intelligence – “Chronic Risk” per UK – What It Means For You Read More »

Russian Cyberspies, Microsoft 2FA Compromised, Oh My

A recent cybersecurity incident revealed how Russian cyberspies managed to bypass Microsoft’s two-factor authentication (2FA) policy by utilizing fake Teams messages. This breach raises concerns about the effectiveness of 2FA and highlights the need for businesses to reassess their security measures to prevent similar attacks. In this article, we will examine the details of the incident, discuss the lessons learned, and provide actionable steps for businesses to address their own similar challenges.

Russian Cyberspies, Microsoft 2FA Compromised, Oh My Read More »

The Importance of Cybersecurity Architecture: Enhancing Posture and Mitigating Risk

In today’s digital landscape, organizations face a myriad of cyber threats that could compromise their sensitive data and disrupt their operations. While many companies may believe they have a strong cybersecurity posture, the absence of a well-defined cybersecurity architecture program can leave them vulnerable and ill-prepared. In this article, we will explore the challenges organizations face without a cybersecurity architecture program and the benefits they can achieve by implementing one. By understanding the importance of cybersecurity architecture, business executives, IT leaders, and cybersecurity managers can take proactive measures to enhance their organization’s security posture and mitigate potential risks.

The Importance of Cybersecurity Architecture: Enhancing Posture and Mitigating Risk Read More »

Vulcan Cyber – New ML Capability for Predictive Risk Prioritization

In today’s digital landscape, businesses face numerous cybersecurity challenges that can jeopardize their sensitive data and infrastructure. One such challenge is ensuring that vulnerabilities are assessed and prioritized effectively to prevent attacks and minimize potential risks. To address this, Vulcan Cyber has introduced a new machine learning (ML) capability that enables predictive risk prioritization. This article will summarize the content and highlight the lessons learned that businesses can consider in addressing their own similar challenges.

Vulcan Cyber – New ML Capability for Predictive Risk Prioritization Read More »

AI – A Security Nightmare, Or Cybersecurity Enabler?

Introduction: In recent years, Artificial Intelligence (AI) has emerged as a transformative technology with the potential to revolutionize various industries. However, as the adoption of AI increases, concerns about its security implications have arisen. This article critically assesses the cybersecurity challenges associated with AI and explores the potential benefits it offers in enhancing defense strategies. […]

AI – A Security Nightmare, Or Cybersecurity Enabler? Read More »

Cybersecurity Challenges in Major Sporting Events: Lessons Learned from the Women’s World Cup

Introduction: As the 2023 FIFA Women’s World Cup progresses towards its knockout stages, Microsoft highlights the need to address the cybersecurity threats that accompany such grand events. Major sporting events have witnessed a rise in cyberattacks in recent years, leading to disruptions and potential security breaches. This article summarizes the content and discusses lessons learned […]

Cybersecurity Challenges in Major Sporting Events: Lessons Learned from the Women’s World Cup Read More »

Scroll to Top