top of page


SOAR vs. XIP – Reactive to Proactive Cyber Security Operations
The NIST Cybersecurity Framework identifies five functions (Identify, Protect, Detect, Respond, and Recover) as the five primary pillars...
Stanislaw Banaszak
25 kwi 20211 minut(y) czytania
1 wyświetlenie
0 komentarzy


Orchestra Group conducts first APAC distie deal with emt Distribution
Will offer Orchestra’s full range of Harmony security products in the region. Cyber security vendor Orchestra Group has signed its first...
Stanislaw Banaszak
18 kwi 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


Press Release: Aplikacje Krytyczne – Poland selected Harmony IoT by Orchestra Group
Aplikacje Krytyczne deployed Harmony IoT to enhance and strengthen its airspace security and overcome its wireless-born cyberattacks...
Stanislaw Banaszak
29 mar 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


Risk of Delay
Many organizations have security policies that have an associated time frame. For example a patch policy could be that a patch must be...
Stanislaw Banaszak
23 mar 20212 minut(y) czytania
1 wyświetlenie
0 komentarzy


Smile – You’re on Camera
Verkada Hack 150,000 security cameras, this time – belonging to Verkada, were exposed in the most recent security breach. This should...
Stanislaw Banaszak
16 mar 20211 minut(y) czytania
0 wyświetleń
0 komentarzy


Exchange, Solarwinds and Supply Chain Attacks
Another major cyber issue is making the rounds this week – the Microsoft Exchange vulnerabilities published last week. The issue is the...
Stanislaw Banaszak
14 mar 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


5 Good Practices for Policy based Cyber Risk
A risk management approach is fundamentally different than the standard approach to cyber security. It requires that organizations...
Stanislaw Banaszak
7 mar 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


…and Cisco Scores a Perfect 10!!
Cisco just published a vulnerability that could allow an unauthenticated, remote attacker to bypass authentication on an affected device....
Stanislaw Banaszak
28 lut 20211 minut(y) czytania
2 wyświetlenia
0 komentarzy


All the (cyber) World’s a Graph
Graphs are about the connectedness of objects. Graph’s show us correlation and dependence between seemingly random objects as well as the...
Stanislaw Banaszak
21 lut 20211 minut(y) czytania
2 wyświetlenia
0 komentarzy


Back to the Future: A 2023 Report on Effective Cyber Risk Management
I talk to a lot of companies about cyber risk management vs. cyber security. I seem to get one of two possible responses – the first...
Stanislaw Banaszak
14 lut 20212 minut(y) czytania
1 wyświetlenie
0 komentarzy


Groundhog Vulnerabilities
Groundhog Day is celebrated each year in the United States and Canada on February 2. It comes from a superstition that if...
Stanislaw Banaszak
7 lut 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


Will Solarwinds be the Crisis Cybersecurity Needs?
All of us in the cybersecurity business like to believe that cybersecurity is a boardroom issue and has been for the last few years. On...
Stanislaw Banaszak
31 sty 20213 minut(y) czytania
0 wyświetleń
0 komentarzy


3 Clear and Present Cyber Dangers in 2021
According to the recently released World Economic Forum (WEF) Global Risks Report 2021, cyber risks continue ranking among the top ten...
Stanislaw Banaszak
24 sty 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


Threat Intelligence + Threat Scenarios = Predictive Cyber Security
Cyber Threat Intelligence (CTI) involves analyzing information about threats and producing guidance on how to respond. An interesting...
Stanislaw Banaszak
17 sty 20211 minut(y) czytania
2 wyświetlenia
0 komentarzy


Capitol Breach and Cyber Threats
Last week pro-Trump rioters occupied portions of the U.S. Capitol building. This is a real issue for cyber defense since once there is...
Stanislaw Banaszak
10 sty 20212 minut(y) czytania
0 wyświetleń
0 komentarzy


Surprise: CISOs are Human
The CISO role is generally considered one the highest stress, least appreciated executive\managerial jobs. Even before the COVID crisis,...
Stanislaw Banaszak
3 sty 20213 minut(y) czytania
1 wyświetlenie
0 komentarzy


Supply Chain Risk Management
NIST Special Publication 800-161 on “Supply Chain Risk Management Practices for Federal Information Systems and Organizations” was issued...
Stanislaw Banaszak
27 gru 20202 minut(y) czytania
0 wyświetleń
0 komentarzy


CISOs, Purple Teams and Cynefin
Cynefin is sense making framework created in 1999 by Dave Snowden. Cynefin offers five decision-making contexts or “domains”: obvious,...
Stanislaw Banaszak
23 gru 20202 minut(y) czytania
0 wyświetleń
0 komentarzy


Microsoft, SUNBURST and Supply Chain Attacks
Continuing my tracking of the Solarwinds trojan (SUNBURST), I came on an article about Microsoft’s response – “Microsoft unleashes ‘Death...
Stanislaw Banaszak
20 gru 20202 minut(y) czytania
1 wyświetlenie
0 komentarzy


More SWAG – This Time Thanks to the US Treasury
There was another breach this week that made headlines – the breach of the US Treasury Department. This time it is assumed to be a supply...
Stanislaw Banaszak
14 gru 20202 minut(y) czytania
1 wyświetlenie
0 komentarzy
bottom of page