Phishing Attacks in Healthcare Environments

Cybersecurity professionals understand this: the fundamental goal of most attacks is to gain access into one system in order to gain further access throughout an organization’s internal and external network and resources. While cyber attacks continue to evolve in their sophistication and attack vector, threat actors will always rely on tried and true methods. For [...]

Read More

Channel Partner Program Testimonial: Triada Networks

"Bandura TIG reduces the attack surfaces that our companies defend, and as a result, we have less to defend. It's very helpful when you bring in something new and it actually reduces your workload, doesn't add to it." Video Testimonial Raffi Jamgotchian is the Owner and Chief Technology Officer of Triada Networks, a boutique cybersecurity [...]

Read More

Phishing Attacks in State & Local Government & Education (SLED)

Cybersecurity professionals understand this: the fundamental goal of most attacks is to gain access into one system in order to gain further access throughout an organization’s internal and external network and resources. While cyber attacks continue to evolve in their sophistication and attack vector, threat actors will always rely on tried and true methods. For [...]

Read More

IONs & ALIENS: How Bandura TIG Increases the Value of AlienVault USM Appliance & AlienVault OTX

POSTED ON MARCH 1, 2019 // BY TODD WELLER As discussed in our recent blog “Experts weigh in on Cybersecurity Trends and Predictions for 2019,” the three “IONs” – integration, orchestration, and automation – are a key security theme for 2019. We see this first hand as many of our customers integrate our Threat Intelligence Gateway […]

Read More

HIMSS 2019 Presentation on Threat Intel Automation

Prevent Cyber Attacks: Automate Your Threat Intel The Bandura team attended HIMSS last week. Todd Weller presented the talk, “Prevent Cyber Attacks: Automate Your Threat Intel” in the Cybersecurity Theatre. Watch his talk and download the materials below, and check out Bandura Cyber for Healthcare and our blog post on the new HICP voluntary cybersecurity [...]

Read More

HICP Voluntary Guidelines Move Healthcare Industry Forward in Cybersecurity

Recently, the U.S. Department of Health & Human Services (HHS) released Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP). The publication of these practices was a requirement of The Cybersecurity Act (CSA) of 2015 and specifically, Section 405d: Aligning Healthcare Industry Security Approaches. This blog provides an overview of HICP and how it [...]

Read More

Construction Firm Uses Threat Intelligence to Prevent Cryptojackers

The Director of IT for Engelberth Construction is busy—very busy. He leads a team of three in charge of cybersecurity, networking, IT, support, and anything and everything tech that keeps the regional construction services company up and running. After one of their cybersecurity tools failed, and experiencing persistent firewall issues that were not solved with [...]

Read More

Three ways cities can improve their cybersecurity resilience

POSTED ON FEBRUARY 1, 2019 // BY TODD WELLER Recently, the Wall Street Journal published an article on the steps American cities are taking to improve their cybersecurity: More U.S. Cities Brace for ‘Inevitable’ Hackers. The consensus is clear: cyber-attackers are increasingly targeting cities, and cities are increasingly looking to cybersecurity insurance to mitigate this risk. However, while cybersecurity […]

Read More

Wholesaler

My wholesale organization is continually trying to secure and harden the perimeters. Our goal was to identify and successfully integrate a cost-effective security appliance and/or service that was effective against a broad spectrum of common security threats while resulting in the least amount of modification to existing network infrastructure and perimeter defense. There is no […]

Read More

Bandura Cyber TIG Data Sheet

Block Threats at Scale. Protect Networks. Improve Staff & Security Tool Efficiency. At any moment, there are tens of millions of active known cyber-threats, and new ones appear every day. Incorporating threat intelligence from a wide variety of sources (commercial, open-source, industry, and government) is now a critical component of a defense-in-depth security strategy that [...]

Read More