Lessons Learned from Analyst Breaches

Security analysts are the cornerstone of many business cybersecurity programs. Having experienced ...

Protecting Your Network Against Brute Force Password Attacks

Everyday, hackers are finding new and sophisticated techniques to compromise networks, yet one of ...

Simple Steps to Online Safety

To kick off National Cyber Security Awareness month, today we're going to talk about one of the ...

2017 Actionable Threat Intelligence Survey

We recently partnered with ISMG to develop and administer a survey delving into the current state ...
The Human Side of Cybersecurity

The Human Side of Cybersecurity

As the waves of ransomware attacks continue to hit the shores of companies around the world prove, ...
Data Breach Alert: 9 States' Voter Databases for Sale

Data Breach Alert: 40 Million U.S. Voter Records for Sale

Over the past few weeks, LookingGlass Cyber Solutions has tracked in an underground forum, the ...

Balancing Passive and Active Cybersecurity Measures

Cybersecurity is one of the top challenges organizations face. No matter the size of a company, it ...

Threat Mitigation and the Problem of False Positives

Businesses face a wave of security threats on a regular basis, and the tide continues to rise. Even ...

A Change in Diplomacy with the Click of a Mouse

By Emilio Iasiello, LookingGlass Cyber Threat Intelligence Group In late May 2017, Qatar’s ...

Third Party Risk: Expanding the Cybersecurity Threat Surface

Third party risk has long been an important concern for Governance, Risk, and Compliance (GRC) ...