Blog

Hackers Changing Their Tactics - Deepfakes, CPU Malware, and More

Heff and Forrest rip into the latest tactics used by hackers to breach your data.

Incident Response: 10 Things to Do if You Have a Data Breach

Learn how to effectively respond to security breaches and prevent future attacks.

T-Mobile Breach Leaks Data in the Millions

Heff and Forrest analyze T-Mobile's sixth breach. Why small and medium businesses are often the target for ransomeware attacks and long-term implications of these breaches.

Increasing Satisfaction in PCI DSS Programs for Acquirers and ISOs

Increasing Satisfaction in PCI DSS Programs for Acquirers and ISOs: Learn why PCI DSS programs are beneficial to businesses and how to manage expectations around PCI programs.

BlackMatter Ransomware Succeeds Darkside and REvil

Tune in this week as Heff and Forrest dive into the recent news with BlackMatter Ransomware, the Olympic breach, and solar winds attack.

What’s changed in CIS Controls (v8)?

Overview of key changes in the CIS controls update. See what’s new in the CIS Controls (v8) and how this free resource can help maximize your security.

2021 Data Breach Forensic Predictions and What Happened in 2020: Part 2

New cybersecurity threats were popping up rapidly going into 2020. We analyzed the trends and made predictions for the rest of the year

Kaseya VSA Zero Day UPDATE

Join Heff and Forrest this week as they go over the latest in the Kaseya VSA Zero Day.

10 Misconceptions about Endpoint Security and Why You Need It

Endpoint security generally refers to cybersecurity tools or services that can help alert you on devices that may be compromised.

Kaseya VSA Zero Day

Tune in for this breaking news segment where Heff and Forrest dive into all you need to know about the Kaseya VSA Zero Day.

Kaseya VSA Software SecurityMetrics Response

We are strongly encouraging all SecurityMetrics clients that use Kaseya VSA software in their environment to follow the recommended guidance provided by CISA and the FBI provided below.

Western Digital Vulnerability Causes Data Loss in Hard Drives

Join Heff this week as he dives into the Western Digital hard drive vulnerability, the recent bad news from Microsoft, and breach #2 of this year for LinkedIn.

Disturbing Trends In Data Breach Responses

The SecurityMetrics Threat Intelligence Center has observed a disturbing trend in data breach responses over the past few months of businesses downplaying the severity of data breaches using a variety of tactics and techniques.

Volkswagen and Fujifilm - Breaches Galore

Join Heff and Forrest as they cover the plethora of breaches (such as Volkswagen and Fujifilm) in the news this week!

5 Acquirer Tips for PCI DSS Program Success

PCI DSS compliance is not only a great tool for protecting payment data, but overall data security.

Amazon Sidewalk's 1-Week Opt-Out for Mass Wireless Sharing

Tune in this week as Heff and Forrest discuss Amazon Sidewalk and their short notice to allow users to opt of of their wireless sharing.

Who Owns Third-Party Security Risk Management

Third-party security risk management (TPRM) is the process of analyzing and addressing risks associated with outsourcing to third-party vendors or service providers.

Storing Unencrypted Credit Card Data: 2021 PANscan® Data Analysis

Card data discovery is an important part of payment data security and complying with PCI DSS requirement 3. If you are going to store credit card data, you’ll need to know where it is captured, where it is stored, where it is transmitted, and where it is received.

What are the HITRUST Requirements? 3 Steps To Get HITRUST Certified

Specific HITRUST requirements are available through HITRUST’s MyCSF portal and will include various implementations of foundational security measures and controls depending on your organization and the type of HITRUST assessment you are performing.

Colonial Pipeline Breach

Watch this week as Heff and Forrest dive into the latest on the HUGE US Colonial Pipeline breach, the recent D.C. police ransomware, and the recent change in malware as a service.

2021 Forensic Predictions and What Happened in 2020: Part 1

The year 2020 was surprising in many ways and the digital forensics industry offered some surprises as well as some more predictable outcomes.

Ivanti Pulse Secure Breach

In this shorter, quicker version of SecurityMetrics News, Heff and Forrest bring you your threat intelligence digest. They discuss the recent Ivanti breach, Apple ransomware, SonicWall's 3 zero days, and more.

Improve Your Security Posture with NIST Cybersecurity Framework

The NIST cybersecurity framework can help guide small-to-medium sized organizations improve their cybersecurity posture.

SecurityMetrics Podcast: Cybersecurity Podcast with Industry Tips

Host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA) brings on guests with unique viewpoints that are important to the entire security and payments ecosystem.