Blog

Kaseya VSA Software SecurityMetrics Response

We are strongly encouraging all SecurityMetrics clients that use Kaseya VSA software in their environment to follow the recommended guidance provided by CISA and the FBI provided below.

Western Digital Vulnerability Causes Data Loss in Hard Drives

Join Heff this week as he dives into the Western Digital hard drive vulnerability, the recent bad news from Microsoft, and breach #2 of this year for LinkedIn.

Disturbing Trends In Data Breach Responses

The SecurityMetrics Threat Intelligence Center has observed a disturbing trend in data breach responses over the past few months of businesses downplaying the severity of data breaches using a variety of tactics and techniques.

Volkswagen and Fujifilm - Breaches Galore

Join Heff and Forrest as they cover the plethora of breaches (such as Volkswagen and Fujifilm) in the news this week!

5 Acquirer Tips for PCI DSS Program Success

PCI DSS compliance is not only a great tool for protecting payment data, but overall data security.

Amazon Sidewalk's 1-Week Opt-Out for Mass Wireless Sharing

Tune in this week as Heff and Forrest discuss Amazon Sidewalk and their short notice to allow users to opt of of their wireless sharing.

Who Owns Third-Party Security Risk Management

Third-party security risk management (TPRM) is the process of analyzing and addressing risks associated with outsourcing to third-party vendors or service providers.

Storing Unencrypted Credit Card Data: 2021 PANscan® Data Analysis

Card data discovery is an important part of payment data security and complying with PCI DSS requirement 3. If you are going to store credit card data, you’ll need to know where it is captured, where it is stored, where it is transmitted, and where it is received.

What are the HITRUST Requirements? 3 Steps To Get HITRUST Certified

Specific HITRUST requirements are available through HITRUST’s MyCSF portal and will include various implementations of foundational security measures and controls depending on your organization and the type of HITRUST assessment you are performing.

Colonial Pipeline Breach

Watch this week as Heff and Forrest dive into the latest on the HUGE US Colonial Pipeline breach, the recent D.C. police ransomware, and the recent change in malware as a service.

2021 Forensic Predictions and What Happened in 2020: Part 1

The year 2020 was surprising in many ways and the digital forensics industry offered some surprises as well as some more predictable outcomes.

Ivanti Pulse Secure Breach

In this shorter, quicker version of SecurityMetrics News, Heff and Forrest bring you your threat intelligence digest. They discuss the recent Ivanti breach, Apple ransomware, SonicWall's 3 zero days, and more.

Improve Your Security Posture with NIST Cybersecurity Framework

The NIST cybersecurity framework can help guide small-to-medium sized organizations improve their cybersecurity posture.

SecurityMetrics Podcast: Cybersecurity Podcast with Industry Tips

Host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA) brings on guests with unique viewpoints that are important to the entire security and payments ecosystem.

Cybersecurity Attack Surfaces: How to Protect All Your Locations

Properly identifying and addressing attack surfaces requires scoping, specialization, and the help of security professionals.

FBI Remotely Hacking Computers to Aid Microsoft Exchange Breach

Heff and Forrest analyze the recent court order allowing the FBI to remotely hack hundreds of private computers.

The 2021 Guide to PCI DSS Compliance Has Launched

The PCI Guide includes interactive and printable IT checklists for every requirement, stories and tips from our security analysts (QSAs), forensic data breach research data, as well as the latest updates on PCI DSS compliance.

PHP GIT Breach, Ubiquiti, and Ransomware 2.0

Heff and Forrest analyze prominent data breaches in the news, including the PHP Git Server, SITA, and Hobby Lobby.

How to Choose a Safe and Secure VPN

VPNs are a popular tool that helps businesses make sure outside users are authorized and that transmitted data is encrypted.

WeLeakInfo Website and Microsoft Server Exploit Update

Heff and Forrest analyze recent cybersecurity news, including the Verkada Security Camera Breach, WeLeakInfo Breach, updates on the Microsoft Exchange Server, and an examination of hacker group FIN8.

Microsoft Exchange Server Zero-Days and SEO Cyberattack

Directive to patch Microsoft Exchange server zero-days immediately SEO Cyberattack: hackers use strategy to push malicious web pages up the rankings Are password managers safe? Experts compare LastPass vs. 1Password

5 Steps on Your Journey Toward Data Privacy and Protection (DPP)

Data privacy and protection (DPP) laws aren’t entirely new to the security and compliance landscape, but the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) are prompting many organizations to take a more formal approach to DPP.

Supercookies, Oldsmar Water-Treatment Breach, Morse Code Phishing Attacks

Heff and Forrest analyze recent cybersecurity news, including supercookies, how to delete recordings from Siri, Alexa, and Google Home, morse code phishing attacks, and updates on the SolarWinds attack.