Brute-Attacks-Blog-Google Plus

Protecting Your Network Against Brute Force Password Attacks

Everyday, hackers are finding new and sophisticated techniques to compromise networks, yet one of ...
Phishing-Blog

Simple Steps to Online Safety

To kick off National Cyber Security Awareness month, today we're going to talk about one of the ...
iSMG-Blog-Post

2017 Actionable Threat Intelligence Survey

We recently partnered with ISMG to develop and administer a survey delving into the current state ...
The Human Side of Cybersecurity

The Human Side of Cybersecurity

As the waves of ransomware attacks continue to hit the shores of companies around the world prove, ...
Data Breach Alert: 9 States' Voter Databases for Sale

Data Breach Alert: 40 Million U.S. Voter Records for Sale

Over the past few weeks, LookingGlass Cyber Solutions has tracked in an underground forum, the ...
Balancing passive and active cybersecurity

Balancing Passive and Active Cybersecurity Measures

Cybersecurity is one of the top challenges organizations face. No matter the size of a company, it ...
ss_551809864_1590

Threat Mitigation and the Problem of False Positives

Businesses face a wave of security threats on a regular basis, and the tide continues to rise. Even ...
Hacking

A Change in Diplomacy with the Click of a Mouse

By Emilio Iasiello, LookingGlass Cyber Threat Intelligence Group In late May 2017, Qatar’s ...
ss_617737619_1590

Third Party Risk: Expanding the Cybersecurity Threat Surface

Third party risk has long been an important concern for Governance, Risk, and Compliance (GRC) ...
ICYMI: Three Cyber Stories You Missed While Everyone Was Talking About WannaCry

ICYMI: Three Cyber Stories You Missed While Everyone Was Talking About WannaCry

In a recent briefing, LookingGlass Threat Researcher Steven Weinstein half-jokingly referred to the ...