man at computer

Three Common Threat Actors and the One You Might Not Know About

We’ve all heard stories of espionage, mafia crime, and lone wolf attackers throughout history. ...
Saving Lives, Losing Data

Saving Lives, Losing Data: Data Breaches in Healthcare

As patient care and health records become digitalized, protecting the healthcare industry is more ...
ScoutThreat

Zero-Day Vulnerabilities: An Inside Look at Luxor2008

When it comes to breaches, we have seen this time and again: an exploited vulnerability that costs ...
CV of Cybercriminal

The CV of a Cybercriminal

What is more attractive than an undetectable, money-making, remote access malware to a ...
Catch a Phish

To Catch a Phish

Probably like you, LookingGlass Cyber Solutions, Inc.’s senior management was recently Phished. ...
Super Bowl Sunday Risk

Super Bowl Sunday Risk – What to look out for at Super Bowl LIII

Super Bowl LIII is less than a week away, and with over 1 million visitors expected in the Atlanta ...
Data Privacy Day 2019

Data Privacy Day: Protecting Your Executives

Today is Data Privacy Day, and we’re joining forces with hundreds of other companies, government ...
Cyber Resolutions Blog

Cybersecurity Resolutions for the New Year and Year-Round

The New Year is often seen as an opportunity for a fresh start. Whether you want a healthier diet, ...
Third party risk explodes

In the 21st Century’s ‘Great Game,’ Third Party Risk Explodes

The recent Shamoon attack on the Italian firm Saipem is a cautionary tale about the danger posed by ...
Naughty or Nice Blog

The Naughty or Nice List: Cyber Edition

Hackers are making a list, checking it twice, and they’re going to find out if you’ve been ...