MicroStrategy Usher: A maturity model for enterprise security.

| June 23, 2017

article image
Today, organizations are facing a challenging and constantly evolving landscape of security threats. Supercharged connectivity, unending streams of information and instantaneous transactions have created unprecedented opportunities for business—but they also create vulnerabilities. Cyber threats continue to target organizations of every size and type around the world, making the need for enterprise security more urgent than ever. Yet many organizations are still reluctant to commit sufcient resources to security, failing to recognize that now, more than ever, security is a critical business competency. Perhaps among the reasons for recent prominent information security breaches is the lingering mentality among business leaders that security is a costly, superfcial accessory. These high-visibility cyber-attacks on global corporations drive home the need for more holistic thinking about security and risk management.

Spotlight

Authority Partners

Authority Partners employs more than 200 people worldwide. We have the knowledge and experience to deliver the innovative technology to help you achieve your business objectives. Our international footprint lets us work at competitive costs without compromising quality or delivery time, and our customer-focused culture makes it easy for us to team seamlessly with your internal Information Systems team.

OTHER ARTICLES

A Closer Look at the Microsoft Exchange Server Cyberattacks

Article | May 13, 2021

We recently posted an article that highlighted the high-profile Microsoft Exchange hack that impacted hundreds of thousands of organizations across the globe. (This article offered some recommendations on how this could have been avoided as well as a special three-month offer to help any company who may have been affected.) Since this cyber attack, even more details are emerging. For example, the White House recently urged victims to quickly patch applications and systems and pushed for them to do it as quickly as possible. One senior administration official emphasized that the window to update these systems could be measured in hours, not even days.

Read More

Wormable, Unpatched Microsoft Bug Threatens Corporate LANs

Article | March 11, 2020

Microsoft is warning on a wormable, unpatched remote code-execution vulnerability in the Microsoft Server Message Block protocol – the same protocol that was targeted by the infamous WannaCry ransomware in 2017.The critical bug (CVE-2020-0796) affects Windows 10 and Windows Server 2019, and was not included in Microsoft’s Patch Tuesday release this week. The bug can be found in version 3.1.1 of Microsoft’s SMB file-sharing system. SMB allows multiple clients to access shared folders and can provide a rich playground for malware when it comes to lateral movement and client-to-client infection. This was played out in version 1 of SMB back in 2017, when the WannaCry ransomware used the NSA-developed EternalBlue SMB exploit to self-propagate rapidly around the world.

Read More

Progress Is the Promise in National Cybersecurity Strategy

Article | March 23, 2020

How can progress be measured when it comes to shifts in national security strategy and practice? Several assessment variables might include changes in official national guidance, legal authorities, types of campaigns or operations, lexicon used in national security discourse, and early results of the application of those changes. Since 2016, with the introduction of the construct of persistent engagement and the subsequent development of defend forward, all these variables have changed in a positive manner.

Read More

Security News This Week: A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH

Article | February 22, 2020

This week was filled with wide-scale calamity. Hundreds of millions of PCs have components whose firmware is vulnerable to hacking which is to say, pretty much all of them. It's a problem that's been known about for years, but doesn't seem to get any better. Likewise, Bluetooth implementation mistakes in seven SoC—system on chips—have exposed at least 480 internet-of-things devices to a range of attacks. IoT manufacturers will often outsource components, so a mistake in one SoC can impact a wide range of connected doodads. The most troubling part, though, is that medical devices like pacemakers and blood glucose monitors are among the affected tech. YouTube Gaming, meanwhile, wants to take Twitch's crown as the king of videogame streaming. But its most-viewed channels are almost all scams and cheats, a moderation challenge that it'll have to take more seriously if it wants the legitimacy it's spending big money to attain. In another corner of Alphabet's world, hundreds of Chrome extensions were caught siphoning data from people who installed them, part of a sprawling adware scheme.

Read More

Spotlight

Authority Partners

Authority Partners employs more than 200 people worldwide. We have the knowledge and experience to deliver the innovative technology to help you achieve your business objectives. Our international footprint lets us work at competitive costs without compromising quality or delivery time, and our customer-focused culture makes it easy for us to team seamlessly with your internal Information Systems team.

Events