Contextual Security Solutions Blog

INFORMATION EVOLVES

SECURITY & COMPLIANCE BLOG

Catchphrase: Data Breach Edition

Catchphrase: Data Breach Edition

Can you tell what the image is? Is it a bear? Or a lion? Maybe a sword wielding ninja? With just roughly 12% of the picture revealed, it’s hard to identify. Now, imagine it’s a breach. With so little information available its no wonder that dwell time prior to discovery after a compromise still hovers around two months and results in an average cost of over 3 million dollars per breach. It’s as important as ever today for organizations to have confidence in their log and monitoring infrastructure. That’s where Contextual Security Solutions comes in. For more information, visit https://contextualsecurity.com.

Q3 Infosec Quarterly Quorum

We look forward to announcing the topic and date for the Q3 2020 Infosec Quarterly Quorum (IQ2) soon. As always the focus of our IQ2's is to present and discuss current events and trends in the realm of information security and compliance. The presentations are...

What’s in the Pen Test?

Is your organization required to have an Annual Penetration Test? Are you currently evaluating vendors or want to know more about the Contextual Security Solutions approach? If so, reach out to our team today for a copy of the "What's in the Pen Test" information...

Should I Have Security Testing Performed

One of the questions our sales team is getting from current and prospective clients relates to whether or not testing should happen during work from home (WFH) and quarantine timeframes. The answer is yes, or no, maybe… If your income has ceased and does not look like...

Protecting Yourself from Online Scammers

 COVID-19 is an issue that has been on many people’s minds during the past few weeks. Unfortunately, scammers and other malicious actors are using people’s fears and uncertainties to take advantage of this crisis. Because of this unfortunate reality, I want to...

Remote Access to the Workplace

Several companies have shifted their workforce from an environment they believe they control to an environment they definitely do NOT control; the employee’s home. There is still A LOT of misunderstanding between traditional IT infrastructure personnel and the...

PMKID Wireless Vulnerability Proof of Concept

What are you talking about? The PMK caching vulnerability was discovered in 2018 and has now been incorporated into most wireless auditing and testing techniques that we perform. So, what is this new thing? The technical aspect resides in the IEEE 802.11 I[1]...