I'm in a NY State of Cybersecurity Regulation

The regulatory environment in cybersecurity continues to evolve. It’s clear the direction is towards a more aggressive regulatory environment. An interesting theme with recent cybersecurity regulations is the far-reaching impact they’re having in terms of organizations impacted.

Published on 21 June 2018
Written by Todd Weller

Automate & Act on ISAC Threat Intelligence

ISAC threat feeds provide valuable, industry-specific TI but as with TI in general, the ability to operationalize it is key to maximizing value.

Published on 01 June 2018
Written by Todd Weller

Amp Up Threat Intelligence, Silence the Alert Jackhammer

PoliWall TIG is enabling organizations to amp up their use of Threat Intelligence and amp down the deafening alert noise security staffs are dealing with.

Published on 22 May 2018
Written by Todd Weller

Five Ways to Reduce Ransomware Risk

Ransomware risk has become a fact of life and while there is no silver bullet to prevent it there are several things you can do to mitigate the risk.

Published on 15 May 2018
Written by Todd Weller

Using a Threat Intelligence Gateway to Reduce Ransomware Risk

All companies are looking at ways to bolster ransomware defenses. While there’s no silver bullet using Cyber Threat Intelligence (CTI) can significantly mitigate ransomware risk.

Published on 08 May 2018
Written by Todd Weller

Threat Intelligence Can Help Increase Cyber Resilience

A recent study by IBM Security & Ponemon Institute highlights how threat intelligence can help increase cyber resilience...

Published on 04 April 2018
Written by Todd Weller

How A Threat Intelligence Gateway Can Help You Better Align with the NIST Cybersecurity Framework

Threat intelligence gateways (TIGs) and specifically Bandura’s PoliWall TIG™ can help companies of all sizes better align to the NIST Cybersecurity Framework...

Published on 08 March 2018
Written by Todd Weller

Importance of Threat Intelligence Increasing in NIST Cybersecurity Framework

This Spring, the National Institute of Standards and Technology (NIST) is set to release the first major update to its Framework for Improving Critical Infrastructure Cybersecurity. While the title suggests this framework is focused on critical infrastructure, the fact is organizations of all sizes and across all industries look to the NIST Framework to guide their cybersecurity efforts...

Published on 27 February 2018
Written by Todd Weller

Taking Advantage of AIG's® CyberEdge® Key Threat Intelligence Benefit

In case you missed it, AIG recently selected Bandura Systems to provide the PoliWall® TIG Blacklist IP blocking and Domain Protection services; and the TechGuard SHIELD™ cyber security awareness training platform (40 courses in 11 languages including a phishing simulator) to qualified* AIG CyberEdge customers...

Published on 13 February 2018
Written by Suzanne Magee

Surprise, It's All Broken Again - The Scale Pivot

To understand what we are currently trying to solve in the cyber security industry it would be helpful to think about where we have been. We need to take a look back at some key points in the last almost 20 years to illustrate the fundamental shifts in the industry...

Published on 03 July 2017
Written by Bill McInnis

FireWall-Side Chat™ #2 – Refrigerators Can Take Down Your Network!

When a computer or network which is identified by its Internet Protocol (IP) address, participates in fraudulent, threatening behavior, it can be posted on a Threat Intelligence List, scored as High-Risk and then blocked by security devices in your network...

Published on 17 January 2017
Written by Suzanne Magee

Reducing Cyber Attack Space for Banks

When a computer or network which is identified by its Internet Protocol (IP) address, participates in fraudulent, threatening behavior, it can be posted on a Threat Intelligence List, scored as High-Risk and then blocked by security devices in your network...

Published on 22 March 2016
Written by Suzanne Magee