Russell Gray

Visibility is Not Enough to Protect Organizations from Identity Threats

Identity and access management (IAM) has become a critical component of any organization’s security strategy. Implementing strict controls over user access and privileges is clearly important for protecting sensitive systems and data. However, relying solely on IAM to secure your environment is insufficient in today’s threat landscape. Sophisticated cyber attacks and insider risks require a more comprehensive approach to security.

Encryption = Privacy ≠ Security

For the past few years, many have been talking about the changing “threat landscape” as it pertains to the increase in zero day, insider and phishing threats. While all of these threats are on the rise, and constitute a concern, there is, perhaps, an even larger shift presenting a threat to enterprises – the shift …

Encryption = Privacy ≠ Security Read More →

Whitepaper: Actionable Anomalies – How MixMode AI Makes Your Security Data Smarter

In today’s ever evolving cybersecurity landscape there are major problems facing professionals that continue to worsen. These problems center around a shortage of tools advanced enough to understand the baseline of a network in order to pinpoint anomalies and a massive information overload problem in the form of security alerts.

Case Study: MixMode AI Detects Attack not Found on Threat Intel

In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt access of a customer database. While the attacker was successful in penetrating the customer’s network, MixMode was able to detect the event before they were successful in penetrating the customer database.

Operational Technology Risk: Attack Paths, Challenges, and Protection for Vital Industrial Systems

I recently attended NTTSecurity’s webinar, “How to Shine a Light on Operational Technology Risk,” to learn more about current Operational Technology (OT) risks and the security challenges facing different industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA). As a client success and support leader servicing customers in various OT sectors, I recommend …

Operational Technology Risk: Attack Paths, Challenges, and Protection for Vital Industrial Systems Read More →

Baltimore City Government Ransomware Attack: Municipalities Must Move Beyond Protection at the Perimeter

Last week The Baltimore Sun reported that Baltimore City Government computers were infected for a second time in just over a year with a certain type of ransomware, RobbinHood, in which hackers lock up files using encryption so users can’t access them. The bad actors then demand payment to provide the cyber keys to unlock the files, …

Baltimore City Government Ransomware Attack: Municipalities Must Move Beyond Protection at the Perimeter Read More →

5 Ways to Modernize Your MSSP Security Monitoring Program

MSSPs are helping their customers deal with a fast-paced and ever-evolving threat landscape. It is critical, now more than ever, to evaluate new monitoring tools that produce more actionable data and alerts to help unearth and combat these modern threats more efficiently.    I recently read an article titled  “4 Technologies SMBs Can Use to Modernize …

5 Ways to Modernize Your MSSP Security Monitoring Program Read More →