Topic: tabletop exercises

  • Crafting an Effective Healthcare Cybersecurity Strategy

    Crafting an Effective Healthcare Cybersecurity Strategy

    Focus on foundational cybersecurity controls like vulnerability management and network segmentation to maximize protection with limited resources, as they offer high-impact risk reduction. Cultivate a strong cybersecurity culture through staff training, making the workforce a cost-effective first...

    Read More »
  • BRICKSTORM Returns: Why Your Enterprise Must Boost Cyber Defenses

    BRICKSTORM Returns: Why Your Enterprise Must Boost Cyber Defenses

    The BRICKSTORM espionage campaign targets legal, technology, SaaS, and BPO firms to steal intellectual property and sensitive data, requiring immediate cybersecurity reassessment. Its stealthy infiltration of overlooked infrastructure like network appliances and virtualization platforms allows at...

    Read More »
  • LNER Supply Chain Attack Exposes Customer Data

    LNER Supply Chain Attack Exposes Customer Data

    A supply chain attack via a third-party supplier exposed LNER customer data, including personal contact details and travel history, but no financial information was accessed. Security experts warn that the stolen data could be used for phishing or identity attacks, advising both organizations and...

    Read More »
  • Cybersecurity Controls: How They Impact Incident Outcomes

    Cybersecurity Controls: How They Impact Incident Outcomes

    Incident response planning, including tabletop exercises and red-team tests, significantly improves readiness and drives broader security investments. Endpoint detection and response (EDR) tools, especially when fully deployed and used in blocking mode, strongly correlate with reduced breach like...

    Read More »