Main Menu
  • Filter:
image
Blog

5 Tips for Securing a Remote Workforce

As the COVID-19 pandemic continues, a new global remote workforce has emerged in an effort to help flatten the curve. As organizations make this necessary transition, changes to infrastructure to...

image
Blog

All Things Secured: January Newsletter

Threat Runner Releases New Ryuk Ransomware Simulation "HORNE Cyber recently announced a major update to Threat Runner.Specifically, the team of reverse-engineering practitioners and software developers responsible for Threat Runner has added...

image
Blog

CISA Releases Insights on Increased Geopolitical Tensions and Threats

With heightened tensions and vowed threats of “revenge” from Iran, the CISA released insights into the potential for cyber and physical attacks against the United States. In a previous blog,...

image
Blog

The Case for Advanced Penetration Testing: Zero-Day Vulnerabilities in Symantec ICSP

Advanced Penetration Testing and Enhanced Red Teaming If you asked me what HORNE Cyber wants to be known for, I would quickly reply with “incomparable penetration testing.” From its conception,...

image
Blog

Cybersecurity and the Power of Belief

How Rethinking Your Public, Private, and Core Beliefs Can Improve Your Cybersecurity Posture “Belief” Defined It should come as no surprise to us that belief drives everything we do as...

image
Blog

Cyber 2020: The Year of Situational Awareness

Situational Awareness: words that were ingrained in my psyche during my years in the military. The phrase is simply defined as, “the perception of environmental elements and events with respect...

image
Blog

12 Tips for Safe Online Shopping this Holiday Sale Season

As the Holiday Season presents itself once again, consumers take to smartphones, tablets, and laptops to research and buy gifts for family, friends, and loved ones. Online shopping proves to...

image
Blog

Friday Brief: The End is Near, Windows 7 End of Support

This year, Microsoft announced End of Support for Windows 7 will begin on January 14, 2020. As we approach the new year, organizations still running Windows 7 should – if...

image
Blog

HORNE Cyber Recognized as one of the "Hot 150 Cybersecurity Companies to Watch in 2020"

We at HORNE Cyber are excited and very grateful to be recognized this week as one of the "Hot 150 Cybersecurity Companies to Watch in 2020" list, published by Cybercrime...

image
Blog

Cybersecurity Awareness Month Brief: Ransomware vs Everyone Else

This cybersecurity awareness month, we’re going to brief you on current hot topics in the cybersecurity space. This week, we’re talking ransomware. Chances are high that “ransomware” has been a...

image
Blog

Ransomware’s Newest Victim: Local Governments and Municipalities

Let’s face it - for many organizations, a ransomware attack is their worst nightmare. The very idea of having the most important files on a single computer encrypted and held...

image
Blog

Bipartisan Support for Increased Cybersecurity Focus

In a rarely glorified show of bipartisan support, the Senate recently introduced a bill to enhance Cybersecurity focus for public companies. U.S. Senators Jack Reed (D-RI), Susan Collins (R-ME), Mark...

image
Blog

Attack Surface Ep. 6: Cyber Assurance Industry Updates (FFIEC, SOC, NIST)

In recent months, there have been several updates and improvements to various cyber assurance frameworks. Leighton Foster, Operations Manager, sat down with Megan Hudson and Brad Aldridge, Cyber Assurance Managers, to discuss...

image
Blog

Cybersecurity in the City: What You Need to Know

Last week, HORNE Cyber, in partnership with Willis Towers Watson Nashville, hosted a cybersecurity seminar at the Franklin Marriott Cool Springs in Franklin, Tennessee. This seminar featured a unique series...

image
Blog

Attack Surface Ep. 5: What's Up with Ransomware and Cryptomining?

I was recently intrigued by the increased number of reported ransomware attacks on local governments. Since the start of the new year, cities such as Akron, Ohio and Sammamish, Washington...

image
Blog

How to know if you need Digital Forensics

For many, the thought of being a part of a digital forensics examination can be stressful and intimidating. But determining if you or your organization needs to initiate a digital...

image
Blog

What's Missing from Your Security Strategy?

I have seen that there’s often a flaw in logic with organizations when it comes to cybersecurity. The market has been flooded with products and services that “AUTOMAGICALLY” take care...

image
Blog

Attack Surface Episode 3: Reverse Engineering Ransomware

In our latest episode of Attack Surface, I sit down with Director of Cyber Operations, Wesley McGrew, to discuss reverse engineering ransomware. McGrew discusses the benefits of reverse engineering in...

image
Blog

Our 5 Most Read Blogs of 2018

As we transition into the new year, we look back at 2018… from previewing DEF CON and Black Hat USA talks to cryptocurrency mining and blockchain, our readers, clients, friends,...

image
Blog

Attack Surface Ep. 2: Predictions for 2019 Cybersecurity Trends

If you're curious about the changes in the threat landscape, organizational roles, and industry business models in the coming year - this episode was made for you. As 2018 comes...

image
Blog

Cybersecurity Lessons from WWII Propaganda

In honor of National Cybersecurity Awareness Month, let's look at how principles from World War II propaganda can teach us valuable lessons in the way we treat cybersecurity today....

image
Blog

Six Considerations for Purchasing Cyber Insurance

In our most recent blog, Brad Pierce discussed what a cyber insurance policy is not. It is not a savior in the wake of a data breach. It is not...

image
Blog

Attack Surface Ep. 1: Three Strategic Investments for Your IT Shop

Join HORNE Cyber’s marketing director, Ashley Madison, as she sits down with Mike Skinner and Brad Aldridge to discuss “Three Strategic Investments for Your IT Shop” on Episode 1 of...

image
Blog

What Cyber Insurance Is Not

The topic of cybersecurity insurance seems to be on the radar of most organizations I speak with. There are a lot of questions around how much coverage is needed and...

image
Blog

Developing an Incident Response Strategy: Preparing for the "What Ifs"

When we think about the impact of an unexpected event, it can often leave us with varying emotions. In many cases, those emotions are not pleasant… such as panic and...

image
Blog

Cybersecurity & Blockchain: What You Need To Know

If you have turned on the TV or been on the internet then most likely you have heard the term "Blockchain". As one of the hottest buzzwords in the tech...

image
Blog

Speaking in Vegas: DEF CON 26 & Black Hat USA 2018

Shot by Wesley McGrew in Las Vegas in 2017 The most important gathering of hackers and security professionals each year is held in the dry heat of Las Vegas’ summer....

image
Blog

Coping with Ransomware Fatigue

Ransomware attacks have increased in number and financial impact significantly. According to the FBI, the cost of ransomware attacks in the past few years has reached into billions of dollars,...

image
Blog

High Expectations for Service, With Reverse Engineering

A cornerstone of a cybersecurity firm is in their “reverse engineering” capability. It is a necessary part of responding to breaches, keeping up with the state-of-the-art in threats, and enhances...

image
Blog

Choosing the Right Security Option for Your Organization

Cybersecurity in layers has been the go-to security model for some time now. There’s no one solution that will properly secure your organization’s network and sensitive information. In today’s environment,...

image
Blog

The Cybersecurity Industry: Ignorance is Bliss

As I’ve pointed out before, the greatest threat to cyber security that organizations face today is the cybersecurity industry itself. I’ve long noticed that every business advisory firm in the...

image
Blog

Cybersecurity and Construction: Can a Breach Happen to Me?

As a contractor, if you think that cyber attacks “will never happen to me”, it’s time to reconsider your stance. Construction companies are an attractive target for a wide variety...

image
Blog

Why an Engaged C-Suite Matters in Improving Cyber Security

In a recent article, I talked about how the C-Suite can get past not being technical and take an offensive mindset to cyber security. I think the big message there...

image
Blog

Cyber Security Silver Bullet: If It Seems Too Good to be True, It Probably Is

I’ve said it before and I’ll keep on saying it: The greatest threat to cyber security could likely be the cyber security industry itself and the “good enough” mindset....

image
Blog

There’s Simply No Such Thing as “Good Enough” in Cyber Security

History tells us that there comes a time when almost every new innovative service starts to lose ground to a “good enough” competitor. In fact, many of the products that...

image
Blog

Don’t Let Cybersecurity Wag the Dog

When “the tail is wagging the dog”, you know that something has gone wrong. Priorities are not straight, and a part of the system does not understand its role. Providers...

image
Blog

Cyber Security for the Road Warrior

In my previous columns, I’ve been describing the benefits of having offense-oriented testing performed on your company’s network. This time around, I want to give some advice for the road...

image
Blog

Why "I'm Just Not Technical" is No Longer an Excuse in the C-Suite

I cannot tell you how many board presentations and meetings I have been in and heard "I am just not technical". Not being “tech savvy” is no longer a valid...

image
Blog

How Much Should You be Spending on Cybersecurity?

We often hear clients and prospective clients asking “how much should I be spending on cybersecurity?” That is a very complex question and one that is not easily answered without first...

image
Blog

Their Breach is Your Breach

When you’re catching up on the news, it’s become all too common to see stories about new breaches that have occurred, resulting in the theft of customers’ personal and financial...

image
Blog

Don't Let Cyber Risk Derail Your M&A Deal

Headlines around hacking and data breaches have become a regular occurrence over the last few years. When a business loses the trust of its customers, it can be nearly impossible...

image
Blog

You've Been Breached. Think It Won't Happen Again?

There’s a popular saying in the cybersecurity space, “There’s two types of organizations, those that have been breached and those that don’t know they’ve been breached.” In working with organizations...

image
Blog

The Victims of Cyber Security Training

It’s harder than you think to identify good talent in cyber security. Whether you’re trying to fill full-time security positions within your organization, or partner with service providers and vendors...

image
Blog

An Internet of Hackable “Things” Threatens Your Business

In this column, I try to avoid “buzz words” and jargon. Information security is complex enough without them. The security industry is overrun with companies that intend to confuse you...

image
Blog

Being a Compliant Victim of Cybercrime

When I discuss cybersecurity with business leaders, the most common misconception I see involves the role of security compliance. In my last column, I described the reality of cybercrime, a...

image
Blog

Why 2017 Could Be the Year of Cyber-Espionage

In this digital age where most businesses are focusing on the disrupt or be disrupted ethos, it seems that most are ignoring an even bigger trend that will affect their...

image
Blog

What Can the C-Suite Learn from the Latest Companies to Suffer Data Breaches?

2016 is ending with another round of major data breaches with online companies such as PayAsUGym, Lynda, and Yahoo....

image
Blog

The Reality of Cybercrime

Computer networks have given us the ability to operate, communicate, and conduct business more easily today than ever before. It is, however, hard to imagine a more dangerous time for...

image
Blog

What Should You Learn From Your Penetration Test?

Having a true advanced penetration test performed on your organization’s infrastructure is one of the fastest ways to gain valuable insight on the state of your security posture. It provides...

image
Blog

Staying Ahead of the Threat

Forrester Research released a report recently which predicted that our President-elect Donald Trump will face a major cyber crisis within the first 100 days of being president. Who knows if...

image
Infographic

Data is the New Currency

It’s not if a breach will occur, it’s when.  Where should you look for vulnerabilities?  What should you do?

image
Whitepaper

Cybersecurity Strategies

Manage your business risk.  Questions to ask and steps to take now.

image
Infographic

Cybersecurity Concerns For Executives & Boards

Executives and boards should take a proactive approach to cybersecurity. Here are are eight areas in which you should pay particular attention.

image
Video

Understanding Cyber Attacks

Organizations typically do not find a hacker on their network for 4-7 months. So, how do you identify an attack and effectively defend your organization?

image
Whitepaper

The Practical Guide to Security at Conferences

Conferences are Target-Rich Environments for Private and Nation-State Intelligence Gathering. 

image
Whitepaper

Attacker Looks at Docker: Approaching Multi-Container Applications

Director of Cyber Operations, Wesley McGrew, recently spoke at Black Hat USA 2018 and DEF CON 26 in Las Vegas. His topic provides hackers experienced in exploitation and post-exploitation of networks of systems with an exposure to containerization and the implications it has on offensive operations. 

image
Whitepaper

Cyber attack on City Hall, an ongoing trend

Dr. Wesley McGrew, Director of Cyber Operations, responds to the recent ransomware attack on the city of Del Rio, noting that the number of attacks occurring in the U.S. is nearly uncountable.