Contact

Asset Owner Identification Automation for Vulnerability Management

A major Communications & Media company faced a large number of long-lived vulnerabilities in their service delivery network for which the asset owner was unknown. Without an asset owner for whom to turn for remediation, each day the situation was going from bad to worse. Their existing manual ownership identification processes were hopelessly overwhelmed by […]

Read More
Created with Sketch.
Position Paper

The Value of Documented Cybersecurity

Leveraging Proactive Documentation as a Cost-effective Solution The latter half of this past decade saw a record number of cybersecurity failures. The biggest breaches had headline-grabbing impacts and heavy financial costs. In 2017, The Equifax hack exposed the personal information of 143 million consumers, and Equifax itself lost $4 billion in stock market value by […]

Read More
icon / insight Created with Sketch.
Insight

The New Cyber Landscape: COVID-19 & Working From Home

With cases of the Novel Coronavirus (COVID-19) causing a devastating global impact, employees and contractors have been forced into remote working situations to deliver both mission critical and day-to-day tasks. This unprecedented shift to telework has brought cybersecurity to the forefront of enterprise threats and challenges. DayBlink has identified some of the top threats that […]

Read More
Created with Sketch.
Position Paper

Building a Culture of Threat Modeling

The growth and complexity of modern cyber threats has led cyber-forward enterprises to implement practices that predict the techniques of their adversaries. Sophisticated information security teams are increasingly adopting proactive measures to understand the landscape of potential security threats and adapt accordingly. What is a Threat Model Threat modeling is a structured approach for reviewing […]

Read More
icon / insight Created with Sketch.
Insight

Mitigating Business Email Compromise Risk: Tax Season Security Tips

    ABOUT THE AUTHORS Martin Badinelli is a Consultant within DayBlink’s Cybersecurity Center of Excellence. Michael Morgenstern is a Partner and Practice Lead of DayBlink’s Cybersecurity Center of Excellence and is based in the Vienna, Virginia office 

Read More
Created with Sketch.
Position Paper

Navigating the California Consumer Privacy Act

Passed into California law on June 28th, 2018, the CCPA is the strongest privacy legislation enacted in any state at the moment, giving more power to consumers in regards to their personal data. At its core, it aims to provide consumers with the right to know what information businesses collect about them, to tell a […]

Read More
icon / insight Created with Sketch.
Insight

Maintaining Cybersecurity After the Zappos Appeal

In 2012, online footwear company Zappos suffered a data breach impacting roughly 24 million consumers which resulted in a class action lawsuit. During the litigation, the District Court of Nevada dismissed certain claims for lack of Article III standing on the basis that the consumers merely alleged a risk of potential harm resulting from the […]

Read More
Created with Sketch.
Position Paper

Nudging for Cybersecurity

Why do security awareness trainings fail to impact employee behavior, and how can nudging help? All too often, cybersecurity is perceived to be overwhelmingly technical in nature. However, Information Security professionals would be wise to keep in mind the words of security expert and cryptographer Bruce Schneier: “Only amateurs attack machines, professionals attack people”. Security […]

Read More
Created with Sketch.
Position Paper

Structuring the Information Security Organization

Keeping up with the Evolving Landscape The continued evolution of enterprise threats has made Chief Information Security Officers (CISOs) consistently seek better opportunities and strategies to defend the perimeter and drive action given scarce resources. Pioneering CISOs capitalize on the opportunity to mitigate threats by optimizing their organizational structure in a manner where defensive and […]

Read More
Created with Sketch.
Position Paper

Cyber War Games and the Role of the Purple Team

Read More