top of page

Purple integration with CyberArk PAM
Orchestra’s Purple integration with CyberArk Privileged Access Manager, simplifies and secures credential management. IT and security...
Stanislaw Banaszak
28 gru 20222 minut(y) czytania
30 wyświetleń
0 komentarzy


The Digital Cyber Twin – The Difference Maker in Knowing Your Cyber Exposure
One of the fundamental challenges facing any organization is how to gain a solid handle on its cyber exposures. Cyber exposure refers...
Stanislaw Banaszak
21 gru 20223 minut(y) czytania
6 wyświetleń
0 komentarzy


Recently Uncovered Linux Security Issues Create Another Wi-Fi Attack Vector
Linux has had long standing issues with memory leaks. These exposures often give attackers the means to crash devices, create denial of...
Stanislaw Banaszak
1 lis 20222 minut(y) czytania
7 wyświetleń
0 komentarzy


So what Exactly is Machine Reasoning, and How do you Teach an AI Model to Behave like an Attacker?
If you create a semantic graph for cyber threats, it will be able to discover which attack vectors your organization is exposed to. So...
Stanislaw Banaszak
29 sie 20225 minut(y) czytania
1 wyświetlenie
0 komentarzy


Do You have an Evil Twin?
Top Five Wireless and IoT Threats Unlike wired networks, wireless networks can be accessed by anyone. Even restricted wireless...
Stanislaw Banaszak
10 maj 20222 minut(y) czytania
3 wyświetlenia
2 komentarze


Threat Susceptibility: Achieving Cyber Resiliency Goals
Cyber resiliency goals (i.e., anticipate, withstand, recover, and adapt) support the linkage between the risk management decisions at the...
Stanislaw Banaszak
26 kwi 20224 minut(y) czytania
1 wyświetlenie
0 komentarzy


Threat Susceptibility: From Risk Management To Active Defense
In our previous blog post in this series, Threat Susceptibility: Countermeasures and Risk Remediation Options, we continued our MITRE...
Stanislaw Banaszak
18 kwi 20224 minut(y) czytania
2 wyświetlenia
0 komentarzy


Threat Susceptibility: Countermeasures and Risk Remediation Options
In the blog post, ‘The Art of Attack vs The Science of Resilience’ Omri wrote “Cyber risk analysis and management is completely dependent...
Stanislaw Banaszak
10 kwi 20224 minut(y) czytania
1 wyświetlenie
0 komentarzy


Threat Susceptibility Assessments: Challenges & Opportunities
What are some of the challenges in assessing cyber threat susceptibility? Penetration Testing is probably the most well-known and most...
Stanislaw Banaszak
4 kwi 20223 minut(y) czytania
0 wyświetleń
0 komentarzy


Assessing Risk using Threat Susceptibility
What are the targets of cyber threats? In the NIST cybersecurity framework core function of ‘Identify,’ organizations are tasked to do...
Stanislaw Banaszak
28 mar 20223 minut(y) czytania
1 wyświetlenie
0 komentarzy


The Art of Attack vs. the Science of Resilience
From personal experience I can definitively say that there is no such thing as 100% cyber security. As we can see from the ever growing...
Stanislaw Banaszak
21 mar 20222 minut(y) czytania
1 wyświetlenie
0 komentarzy

Urgent Update: CVE-2021-44228 Log4j Vulnerability
Summary On December 9, 2021 a serious vulnerability in the Java-based logging package Log4j was disclosed. This is a remote code...
Stanislaw Banaszak
22 gru 20212 minut(y) czytania
2 wyświetlenia
0 komentarzy


Israeli cybersecurity co Orchestra acquires Netformx
The acquisition will expand Orchestra’s information security platform and enable it to discover network vulnerabilities while increasing...
Stanislaw Banaszak
14 gru 20211 minut(y) czytania
3 wyświetlenia
0 komentarzy


Governance and Policy in Practice
Part 4. Rethinking cybersecurity from the viewpoint of risk There are two principles to planning good governance: you automate away toil...
Stanislaw Banaszak
12 gru 20213 minut(y) czytania
2 wyświetlenia
0 komentarzy


Policy Bow Ties and Risk Based Policy
Part 3. Rethinking cybersecurity from the viewpoint of risk Policy is the centrepiece of both cybersecurity and risk management. Having a...
Stanislaw Banaszak
12 gru 20213 minut(y) czytania
0 wyświetleń
0 komentarzy


Digital Risk Management By Promise
Part 2. Rethinking cybersecurity from the viewpoint of risk The ability to estimate risk presumes a certain level of insight into...
Stanislaw Banaszak
12 gru 20213 minut(y) czytania
0 wyświetleń
0 komentarzy


Risk Paralysis and Cyber-insecurity
Part 1. Rethinking cybersecurity from the viewpoint of risk Did we get cybersecurity wrong? Thirty years after the infamous Internet Worm...
Stanislaw Banaszak
12 gru 20214 minut(y) czytania
1 wyświetlenie
0 komentarzy


Airspace Vulnerabilities in Healthcare
Wireless adoption is quickly emerging in every industry vertical that is using digitalization to simplify operations. The issue is that...
Stanislaw Banaszak
30 sie 20212 minut(y) czytania
1 wyświetlenie
0 komentarzy


Why Should You Care about Cyber Threat and Risk Assessment?
Cyber risks are evolving fast and organizations need to deal with them in more efficient ways. This requires an all-inclusive and agile...
Stanislaw Banaszak
29 sie 20215 minut(y) czytania
0 wyświetleń
0 komentarzy


Risk Based Vulnerability Management
Cyber defense is moving to a risk management and operations paradigm (see previous posts on effective cyber risk management and policy...
Stanislaw Banaszak
7 cze 20211 minut(y) czytania
1 wyświetlenie
0 komentarzy
bottom of page