CV of Cybercriminal

The CV of a Cybercriminal

What is more attractive than an undetectable, money-making, remote access malware to a ...
Catch a Phish

To Catch a Phish

Probably like you, LookingGlass Cyber Solutions, Inc.’s senior management was recently Phished. ...
Super Bowl Sunday Risk

Super Bowl Sunday Risk – What to look out for at Super Bowl LIII

Super Bowl LIII is less than a week away, and with over 1 million visitors expected in the Atlanta ...
Data Privacy Day 2019

Data Privacy Day: Protecting Your Executives

Today is Data Privacy Day, and we’re joining forces with hundreds of other companies, government ...
Cyber Resolutions Blog

Cybersecurity Resolutions for the New Year and Year-Round

The New Year is often seen as an opportunity for a fresh start. Whether you want a healthier diet, ...
Third party risk explodes

In the 21st Century’s ‘Great Game,’ Third Party Risk Explodes

The recent Shamoon attack on the Italian firm Saipem is a cautionary tale about the danger posed by ...
Naughty or Nice Blog

The Naughty or Nice List: Cyber Edition

Hackers are making a list, checking it twice, and they’re going to find out if you’ve been ...
Tips to Big Data Use in Cybersecurity Operations

Tips to Big Data Use in Cybersecurity Operations

The term Big Data is often misused or used to represent many different concepts depending on who ...
Mass Scanning

Don’t Be a Victim of Opportunity: Keep Your Network from Being Exposed by Mass Scanning

Threat actors are continuously looking for the easiest way into your network. Whether access is ...