Contextual Security Solutions Blog
INFORMATION EVOLVES
SECURITY & COMPLIANCE BLOG
The Need for Incident Response Playbooks
The most recent Cost of a Data Breach Report (Ponemon 2021) found that “Lost Business Cost” represented the largest percentage (38%, or $1.59M) of the $4.2M average cost of a data breach. One of the key contributors to the “Lost Business Cost”, along with the cost of...
0-Day
What are we talking about? On May 30 CVE 2022-30190, https://nvd.nist.gov/vuln/detail/CVE-2022-30190, was issued by Microsoft. According to the Common Vulnerability Scoring System this is currently ranked as a high-severity vulnerability with a 7.8 out of 10. A...
False Positives / What Are They Doing Here?
False positives can be difficult to disprove and even harder to understand. They stem from an automated product, like a vulnerability scanner, doing its best to determine whether a specific condition exists or not. Unfortunately, a lot of people end up trying to...
Visibility and “Actionable” Metrics / #ExpectMore Series
Continuing with our #ExpectMore series, I want to explore some commonly used terms and what they might look like during a penetration test in your environment. “Visibility”, “Actionable Metrics”, these terms are frequently used in the cybersecurity world by vendors...
Security Assessments & Security Debt / #ExpectMore Series
At Contextual Security Solutions we are continuously looking for ways in which we can better serve our customers. It has been a primary focus from day one, almost ten years ago. Whether it’s through the creation of our illumino Compliance...
Why Every Organization Needs a Sufficient Incident Response Plan
Organizations across all sectors rely on technology to run their businesses. It is a vital component that is necessary to handle nearly every aspect of the day-to-day workings of any business. With the presence of this technological integration comes the risk of...
What is the SolarWinds Hack?
Long before rioters pushed and forced their way into the U.S. Capitol, a stealthier invader was lurking through the computers of government officials, stealing documents, monitoring emails, and setting up traps for future attacks. Foreign hackers, who top US officials...
What Does the Current Presidential Administration Look Like for the Cyber Environment?
The president has promised that cybersecurity will be a top priority of his administration. The administration hasn't wasted any time putting together what some have called a “world-class” cybersecurity team of officials and they are diligently working to create a...
2021 Exchange Breaches (HAFNIUM)
In response to the recent Microsoft Exchange exploits, and the desire to funnel relevant information into a single source, Contextual Security Solutions has consolidated some information regarding the recent 0-day exploitation. If you are running MS-Exchange (2013,...
Cyber Security for the New World of ‘Work From Home’
When the novel coronavirus first hit back in March of 2020, no one could have ever predicted what was to come. Now, nearly a year later, millions of people are still working from home, with no real end in sight. This new remote workforce left organizations scrambling...