How a Bandura Cyber TIG Automates FFIEC Quarterly Firewall Audits

POSTED ON JUNE 3, 2019 Federal Financial Institutions Examination Council (FFIEC) compliance relates to how a financial institutions adheres to a set of guidelines and standards designed to protect the data held by financial institutions. FFIEC provides actionable, uniformed, reasonable cybersecurity guidelines for financial services institutions of varying sizes. The FFIEC Cybersecurity Assessment Tool (CAT) [...]

Read More

The Florida Election Hack Shows We Need Advanced Threat Intelligence & Collaboration

POSTED MAY 31, 2019 // BY LISA RHODES, HEAD OF STATE & LOCAL, EDUCATION Alarming news confirmed last week by Florida Governor Ron DeSantis acknowledges Russian hackers successfully tapped into the voter registration files of two undisclosed Florida counties. However, some officials in Florida remain unfazed. Since there was no breach tied to the announcement, some [...]

Read More

Dark Reading Article: How We Collectively Can Improve Cyber Resilience

POSTED ON MAY 10th, 2019 // BY TODD WELLER There are three steps you can take to improve cyber resilience, based on Department of Homeland Security priorities.  At the 2019 RSA Conference earlier this year, Chris Krebs, director of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA), outlined several key priorities the agency [...]

Read More

Law Firm Protects Against Cyber Threats & Third-Party Risk While Improving TCO & ROI

Founded in 1945, Evans & Dixon is a law firm that represents corporate clients across multiple areas of practice ranging from insurance defense to corporate workman’s compensation, HR claims to patents and copyrights. Working with high profile, Fortune 1000 clients, the law firm is vigilant in protecting not only its own internal network, but also [...]

Read More

Phishing Attacks in Healthcare Environments

Cybersecurity professionals understand this: the fundamental goal of most attacks is to gain access into one system in order to gain further access throughout an organization’s internal and external network and resources. While cyber attacks continue to evolve in their sophistication and attack vector, threat actors will always rely on tried and true methods. For [...]

Read More

Channel Partner Program Testimonial: Triada Networks

"Bandura TIG reduces the attack surfaces that our companies defend, and as a result, we have less to defend. It's very helpful when you bring in something new and it actually reduces your workload, doesn't add to it." Video Testimonial Raffi Jamgotchian is the Owner and Chief Technology Officer of Triada Networks, a boutique cybersecurity [...]

Read More

Phishing Attacks in State & Local Government & Education (SLED)

Cybersecurity professionals understand this: the fundamental goal of most attacks is to gain access into one system in order to gain further access throughout an organization’s internal and external network and resources. While cyber attacks continue to evolve in their sophistication and attack vector, threat actors will always rely on tried and true methods. For [...]

Read More

IONs & ALIENS: How Bandura TIG Increases the Value of AlienVault USM Appliance & AlienVault OTX

POSTED ON MARCH 1, 2019 // BY TODD WELLER As discussed in our recent blog “Experts weigh in on Cybersecurity Trends and Predictions for 2019,” the three “IONs” – integration, orchestration, and automation – are a key security theme for 2019. We see this first hand as many of our customers integrate our Threat Intelligence Gateway […]

Read More

HIMSS 2019 Presentation on Threat Intel Automation

Prevent Cyber Attacks: Automate Your Threat Intel The Bandura team attended HIMSS last week. Todd Weller presented the talk, “Prevent Cyber Attacks: Automate Your Threat Intel” in the Cybersecurity Theatre. Watch his talk and download the materials below, and check out Bandura Cyber for Healthcare and our blog post on the new HICP voluntary cybersecurity [...]

Read More

HICP Voluntary Guidelines Protect Against Healthcare Cyber Attacks

Recently, the U.S. Department of Health & Human Services (HHS) released Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP). The publication of these practices was a requirement of The Cybersecurity Act (CSA) of 2015 and specifically, Section 405d: Aligning Healthcare Industry Security Approaches. This blog provides an overview of HICP and how it [...]

Read More