DEFENSESTORM

Cyber Security RESOURCES

Thought leadership and customer testimonials are some of the many ways we build a community of trust. These cyber security resources highlight our recent research and success stories.

Cyber security risk management solutions from DefenseStorm.
Fraud Fusion Centers: The NEW Way to Stop Cyber Fraud

Insights

Fraud Fusion Centers: The NEW Way to Stop Cyber Fraud

With a resolute effort to unite against the threat of cyber fraud, Fraud Fusion Centers are being embraced across all industries to effectively combat cyber fraud.

Creating a Proactive Cybersecurity Risk Management Plan

Insights

Creating a Proactive Cybersecurity Risk Management Plan

Cybersecurity risk management is a critical component of risk for banks and credit unions and by taking a proactive approach to risk, you can identify, mitigate, and even prevent risk before it’s too late. Learn how DefenseStorm’s built for banking approach can help you tackle cybersecurity risk and keep your institution cyber risk ready.

Cybercriminals Love the Olympics Too, but for Different Reasons.

Insights

Cybercriminals Love the Olympics Too, but for Different Reasons.

The Olympic Games begin July 26, 2024, and end August 11, 2024. I, like most people around the globe, will be watching and cheering on our nation’s athletes as they achieve their goals and live out their Olympic dreams. Unlike most of the audience, though, I will also be thinking about the unseen but expected threats and attacks that will be occurring from cybercriminals and bad threat actors taking advantage of such a major event.

Cybersecurity Risk 2024: Keeping Pace with Evolving Standards

Insights

Cybersecurity Risk 2024: Keeping Pace with Evolving Standards

A proposed rule from the Federal Deposit Insurance Corporation (FDIC) will establish new regulatory standards and increase the focus of cybersecurity risk management and governance while bringing an expectation of faster response times and real-time remediation of deficiencies.

New Account Takeover Fraud Prevention Functionality – Community Watchlists

Insights

New Account Takeover Fraud Prevention Functionality – Community Watchlists

DefenseStorm has updated its Account Takeover Fraud Prevention further enhancing its capabilities as a powerful cyber risk management solution.  Organizations can now join the Community Watchlists within Account Takeover Fraud Prevention, where they not only receive alerts of new threats, but can add a threat to the watchlist directly from the Alert view.

New Guidance for Managing Cybersecurity Risks with NIST CSF 2.0

Insights

New Guidance for Managing Cybersecurity Risks with NIST CSF 2.0

NIST’s Cybersecurity Framework (CSF) is designed to help institutions of all sizes and sophistication levels manage and reduce their unique cybersecurity risks. With the release of CSF 2.0, the guidance provided by NIST has expanded the practice and controls that institutions can use to best understand, assess, prioritize, and communicate its cybersecurity efforts.

Cyber Scams and the Election: What You Need to Know

Insights

Cyber Scams and the Election: What You Need to Know

Cyber scams and election season just go together, and as election season begins to ramp up, so will cyber scams and the variety of tactics that bad actors will deploy in the attempt to obtain your personal information.

The Rise of Banking Trojans in Rogue Mobile Apps

Insights

The Rise of Banking Trojans in Rogue Mobile Apps

Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. As investment from fast-moving threat actors continues to increase, traditional security practices are unable to keep up.

Cyber Security Software: GRID Active Governance Reporting Functionality

Insights

Cyber Security Software: GRID Active Governance Reporting Functionality

DefenseStorm has made a cyber security software update to our GRID Active Governance Program with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution.  Organizations now can link dashboards to task schedules for scheduling and documenting report reviews.

Cyber Risk Assessment Functionality: Exception Tracking and Reporting

Insights

Cyber Risk Assessment Functionality: Exception Tracking and Reporting

DefenseStorm’s cyber risk assessment solution has recently been updated with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution with GRID Active Risk Assessment Exceptions.

Cyber Security Alerts: Apple’s Name Drop Feature

Insights

Cyber Security Alerts: Apple’s Name Drop Feature

Keeping up with cyber security alerts is important and Apple just rolled out a new default feature for iPhone and Apple watch that allows nearby users to share contact information with one another. This feature has sparked some concern in online social communities and even prompted law enforcement agencies to release statements and privacy warnings over the last few days due to the concern that people could “drop” information on another user’s phone at random, which seems scary.

CISO on Cyber Risk: Embracing Accountability and Transparency in the Wake of the SolarWinds Lawsuit

Insights

CISO on Cyber Risk: Embracing Accountability and Transparency in the Wake of the SolarWinds Lawsuit

Cyber risk Insights from the desk of DefenseStorm’s Chief Information Security Officer, William Wetherill.

The Importance of Cyber Security Asset Management

Insights

The Importance of Cyber Security Asset Management

Cyber security asset management is a critical concern for any organization, regardless of its size or industry. For financial institutions (FIs), it’s vital due to the sensitive data and valuable assets they are entrusted to safeguard. While there are many aspects to consider in building a robust cybersecurity program, one crucial component is effective asset management.

Fraud Prevention Releases: User Behavior Analytics (UBA) model in GRID Active

Insights

Fraud Prevention Releases: User Behavior Analytics (UBA) model in GRID Active

GRID Active Fraud Prevention is powered by machine learning and helps financial institutions to proactively detect fraud and monitor suspicious non-monetary activities, complementing rules-based approaches to detect fraudulent activities.

SIM Swapping – A Tried and True Tactic

Insights

SIM Swapping – A Tried and True Tactic

SIM Swapping is nothing new and if you stay up to date with cybersecurity news and events, you are likely bombarded with technical analysis of the latest in ransomware, malware, dropper, trojan, or vulnerability that was exploited by bypassing controls and using “living off the land” techniques. 

While these tactics, techniques, and analyses are incredibly important and useful, we can often forget that it’s sometimes the simple, age-old ways of getting your information and property that can also harm us.

Account Holder Fraud Prevention: Alert Enhancements

Insights

Account Holder Fraud Prevention: Alert Enhancements

As fraud prevention in banking continues to be crucial in today’s digital landscape, it’s imperative for fraud investigators to utilize efficient tools that empower and support their investigative work.  The current Trigger and Alert views have been strategically modified to enhance the service provided to fraud investigators where they can now see relevant information that is intuitive to their role.

The Impact of AI on Cybersecurity Part 3: The DefenseStorm Approach

Insights

The Impact of AI on Cybersecurity Part 3: The DefenseStorm Approach

In our final entry into our series, The Impact of AI on Cybersecurity, we will explore how DefenseStorm utilizes AI in our own built-for-banking technology.

Firewall Security: Strengthening the Weakest Link in Cybersecurity

Insights

Firewall Security: Strengthening the Weakest Link in Cybersecurity

Innovations in technology and security are top of mind for banks and credit unions, and when it comes to firewall security, it is critical to strengthen the weakest link in your cybersecurity efforts. As cyber risks evolve, institutions of all asset sizes must prioritize and invest in strengthening cybersecurity efforts.

The Impact of AI on Cybersecurity Part 2: The Role of AI in Financial Services

Insights

The Impact of AI on Cybersecurity Part 2: The Role of AI in Financial Services

The financial sector has seen a significant transformation due to digital technology. The industry has been pushed to be more dynamic to meet the demands of customers, regulatory requirements, and security threats, and remain competitive while safeguarding customer data and assets.

Understanding Business Email Compromise

Insights

Understanding Business Email Compromise

Business email compromise (BEC) is a type of cyberattack that usually occurs through some type of social engineering campaign where the criminals assume the identity of a trusted person or organization and attempt to influence their victims into providing money through transfers or other digital payments, divulging personal information, making phony purchases, providing credentials to accounts, etc

 

Redefining Cybersecurity Part 5: Cyber Risk Awareness

Insights

Redefining Cybersecurity Part 5: Cyber Risk Awareness

In the final installment of our Redefining Cybersecurity series, we explore Cyber Risk Awareness. While the deployment of new technology is critical to ensuring cyber risk readiness, a lack of training and awareness is a significant liability to any institution.

The Impact of AI on Cybersecurity Part 1: Role of AI in Cybersecurity

Insights

The Impact of AI on Cybersecurity Part 1: Role of AI in Cybersecurity

The role of artificial intelligence (AI) has had an unprecedented impact on cybersecurity. AI is transforming daily business practices and enhancing the customer experience for most industries, but it is imperative to effectively balance technological advancement with close oversight while these technologies are rolled out.

NCUA Cyber Incident Notification Requirements

Insights

NCUA Cyber Incident Notification Requirements

NCUA Cyber Incident Notifications Requirement goes into effect September 1, 2023.  The final rule requires that covered institutions notify the NCUA as soon as possible, and no later than 72 hours, after the credit union reasonably believes it has experienced a reportable cyber incident or received a notification from a third party regarding a reportable cyber incident.

Redefining Cybersecurity Part 4: The Power of a Buyer’s Guide

Insights

Redefining Cybersecurity Part 4: The Power of a Buyer’s Guide

Part 4 of our Redefining Cyber Security series explores the power of a buyer’s guide, a vendor-neutral tool created by DefenseStorm to help FIs efficiently shop for new cyber security risk management solutions.

Redefining Cybersecurity Risk Management Part 3: Bridging the Communication Gap

Insights

Redefining Cybersecurity Risk Management Part 3: Bridging the Communication Gap

An effective cyber risk management strategy requires everyone within the FI to work together with a unified goal for budget allocation and solution implementation.

You Play Like You Practice: Cyber Incident Response

Insights

You Play Like You Practice: Cyber Incident Response

Military, law enforcement, and first responders train constantly to be prepared for anything that they may face during their careers, so when those particular situations arise, they are confident, efficient, and knowledgeable about how to deal with and resolve the incident. Cyber incident response is no different.

Redefining Cybersecurity Part 2: Cyber Security Risk Readiness

Insights

Redefining Cybersecurity Part 2: Cyber Security Risk Readiness

With a deeper understanding of this shift in ideology from reactive to proactive solutions, the question arises about your financial institution’s (FI’s) level of cyber security risk readiness.

Redefining Cybersecurity Part 1: Cybersecurity and Risk Management

Insights

Redefining Cybersecurity Part 1: Cybersecurity and Risk Management

In this 5 part series, Redefining Cybersecurity, we will walk your FI through the process of evaluating your current state of cybersecurity and risk management so you can employ more efficient solutions to stay threat ready and compliant.

Endpoint Attacks Tips and Best Practices

Insights

Endpoint Attacks Tips and Best Practices

By following a well-established response plan for Endpoint Attacks, organizations can help ensure the confidentiality and integrity of their systems and data.

Future of AI in Cybersecurity: The Power of Partnership

Insights

Future of AI in Cybersecurity: The Power of Partnership

As artificial intelligence (AI) technology enriches various aspects of our lives, a critical question remains regarding whether its capabilities and implications will drive cybersecurity toward success or serve as a catalyst for its downfall.