DEFENSESTORM

RESOURCES

Thought leadership and customer testimonials are some of the many ways we build a community of trust. These resources highlight our recent research and success stories.

DefenseStorm
The Human Firewall: Strengthening the Weakest Link in Cybersecurity

Insights

The Human Firewall: Strengthening the Weakest Link in Cybersecurity

Innovative technology has revolutionized the way we work and live by unlocking a wealth of new capabilities. As artificial intelligence makes daily operations more efficient and flexible, people become increasingly reliant on the luxury of digital technology. Of course, businesses then competitively introduce the latest and greatest to meet the demands. With new technology and changed business operations comes exposure to new cyber risks, prompting companies to prioritize and invest in stronger cybersecurity measures.

AI and its Impact on Cybersecurity Part 2:  The Role of AI in Financial Services

Insights

AI and its Impact on Cybersecurity Part 2: The Role of AI in Financial Services

The financial sector has seen a significant transformation due to digital technology. The industry has been pushed to be more dynamic to meet the demands of customers, regulatory requirements, and security threats, and remain competitive while safeguarding customer data and assets.

Understanding Business Email Compromise

Insights

Understanding Business Email Compromise

Business email compromise (BEC) is a type of cyberattack that usually occurs through some type of social engineering campaign where the criminals assume the identity of a trusted person or organization and attempt to influence their victims into providing money through transfers or other digital payments, divulging personal information, making phony purchases, providing credentials to accounts, etc

 

Fraud Squad: Zelle Bank Impersonation Scam

Insights

Fraud Squad: Zelle Bank Impersonation Scam

As peer-to-peer (P2P) digital payment platforms like Venmo and Paypal rapidly grew in popularity for their ability to provide easy, convenient money transfers, several major banks collaborated to create Zelle. The new transfer application promised to be “the next big thing” in banking, yielding near-instantaneous transfers directly between banks. Unfortunately, with new digital technology comes increased risk.

 

Redefining Cybersecurity Part 5: Cyber Risk Awareness

Insights

Redefining Cybersecurity Part 5: Cyber Risk Awareness

The previous posts in this series have covered topics like shifting from cybersecurity to proactive cyber risk management, reinforcing cyber risk readiness, bridging communication gaps, and harnessing the power of a buyer’s guide to build a robust cyber risk management solution. While these are integral to designing an efficient cyber risk management program, the final and crucial piece of the puzzle is cyber risk awareness. If your employees lack awareness of the constantly evolving threats to your financial institution (FI), they become a significant liability to your security, despite your adherence to the latest recommendations and employment of state-of-the-art technology.

AI and its Impact on Cybersecurity Part 1: Role of AI in Cybersecurity

Insights

AI and its Impact on Cybersecurity Part 1: Role of AI in Cybersecurity

The role of artificial intelligence (AI) has had an unprecedented impact on cybersecurity. AI is transforming daily business practices and enhancing the customer experience for most industries, but it is imperative to effectively balance technological advancement with close oversight while these technologies are rolled out.

Fraud Squad: Life Savings Lost to a Bank Scam

Insights

Fraud Squad: Life Savings Lost to a Bank Scam

A small business owner recently fell victim to a sophisticated bank scam that drained her life savings, where scammers exploited two-factor authentication to gain access and withdraw money from her account. This cautionary story serves as a warning about the increasing prevalence of fraud and emphasizes the significance of using effective fraud detection systems.

NCUA Cyber Incident Notification Requirements

Insights

NCUA Cyber Incident Notification Requirements

NCUA Cyber Incident Notifications Requirement goes into effect September 1, 2023.  The final rule requires that covered institutions notify the NCUA as soon as possible, and no later than 72 hours, after the credit union reasonably believes it has experienced a reportable cyber incident or received a notification from a third party regarding a reportable cyber incident.

Redefining Cybersecurity Part 4: The Power of a Buyer’s Guide

Insights

Redefining Cybersecurity Part 4: The Power of a Buyer’s Guide

In the Redefining Cybersecurity: Bridging the Communication Gap blog, we discussed resources and tools that can help open a dialogue with decision-makers. One of the resources is a Buyer’s Guide which was created by DefenseStorm as a vendor-neutral tool to help financial institutions (FIs) efficiently shop around for new solutions.

Redefining Cybersecurity Part 3:  Bridging the Communication Gap

Insights

Redefining Cybersecurity Part 3: Bridging the Communication Gap

An effective cyber risk management strategy requires everyone within the FI to work together with a unified goal for budget allocation and solution implementation.

You Play Like You Practice: Preparedness for Cyber Incidents

Insights

You Play Like You Practice: Preparedness for Cyber Incidents

Military, law enforcement, and first responders train constantly to be prepared for anything that they may face during their careers, so when those particular situations arise, they are confident, efficient, and knowledgeable about how to deal with and resolve the incident.  Incident response in cybersecurity is no different.

Redefining Cybersecurity Part 2: Cyber Risk Readiness

Insights

Redefining Cybersecurity Part 2: Cyber Risk Readiness

With a deeper understanding of this shift in ideology from reactive to proactive solutions, the question arises about your financial institution’s (FI’s) level of cyber risk readiness.

Redefining Cybersecurity Part 1: Cyber Risk Management

Insights

Redefining Cybersecurity Part 1: Cyber Risk Management

In this series, Redefining Cybersecurity, we will walk your FI through the process of evaluating your current state of cyber risk readiness so you can employ more efficient solutions to stay threat ready and compliant.

Tips for Handling Endpoint Attacks

Insights

Tips for Handling Endpoint Attacks

By following a well-established response plan, organizations can help ensure the confidentiality and integrity of their systems and data.

Fraud Fusion Centers: The NEW Way to Stop Cyber Fraud

Insights

Fraud Fusion Centers: The NEW Way to Stop Cyber Fraud

With a resolute effort to unite against the threat of cyber fraud, Fraud Fusion Centers are being embraced across all industries to effectively combat cyber fraud.

Future of AI in Cybersecurity: The Power of Partnership

Insights

Future of AI in Cybersecurity: The Power of Partnership

As artificial intelligence (AI) technology enriches various aspects of our lives, a critical question remains regarding whether its capabilities and implications will drive cybersecurity toward success or serve as a catalyst for its downfall.

Enhanced Incident Monitoring: From a Limited to Comprehensive View

Insights

Enhanced Incident Monitoring: From a Limited to Comprehensive View

GRID Active Threat Surveillance now includes an Incident Similarity feature which leverages machine learning to enhance incident management.

GRID Active Self Service Restores

Insights

GRID Active Self Service Restores

Navigating the complex world of financial regulations and data retention just got easier with DefenseStorm’s latest innovation.

GRID Active Risk Assessment Quantitative Scoring Model

Insights

GRID Active Risk Assessment Quantitative Scoring Model

DefenseStorm offers a proactive approach to cyber risk management so financial institutions can stop cyberthreats before they become destructive cyberattacks, allowing them to better protect their account holder and communities.

Four New Frameworks in GRID Active Governance Program

Insights

Four New Frameworks in GRID Active Governance Program

Within our DefenseStorm Governance Program, our clients can systematically collect evidence from across the platform to document adherence to frameworks and self-assessments.

Is It Possible to Take the Pain Out of Cyber Risk Assessments?

Insights

Is It Possible to Take the Pain Out of Cyber Risk Assessments?

If you’ve ever been involved with a risk assessment, you know just how painful it can be. Learn how you can reframe how you think about risk assessments and consider some new, fresh approaches.

How I’ve Loved What I Do – or Learned to Move On!

Insights

How I’ve Loved What I Do – or Learned to Move On!

The older and hopefully wiser I get, the more I find myself both grateful and amazed to get paid to do the work I love.

What Banks & Credit Unions Must Know About the New Computer Security Incident Notification Rule Part 2

Insights

What Banks & Credit Unions Must Know About the New Computer Security Incident Notification Rule Part 2

In part one of this blog post, we gave you an in-depth look into the new Computer Security Incident Notification Rule. This is the rest of the story…

What Banks & Credit Unions Must Know About the New Computer Security Incident Notification Rule Part 1

Insights

What Banks & Credit Unions Must Know About the New Computer Security Incident Notification Rule Part 1

The OCC, Board, and FDIC released the final rule, Computer-Security Incident Notification Requirements for Banking Organizations and Their Bank Service Providers, on Nov. 23, 2021, which goes into effect April 1, 2022, and requires mandatory compliance on May 1, 2022.

Thriving in a Male-Dominated Industry (As A Woman)

Insights

Thriving in a Male-Dominated Industry (As A Woman)

Open dialog and idea sharing are how we build a community of trust at DefenseStorm, and everyone plays a role in that – speak up and encourage others to do the same!

Help Wanted: How to Think Creatively to Fill the Cybersecurity Skills Gap

Insights

Help Wanted: How to Think Creatively to Fill the Cybersecurity Skills Gap

It’s a matter of supply and demand. As in, the supply of cybersecurity professionals in the United States – and actually worldwide – is much lower than demand calls for.

What Did the Super Bowl Teach Us About Cybersecurity: It Only Takes One Mistake

Insights

What Did the Super Bowl Teach Us About Cybersecurity: It Only Takes One Mistake

We owe our information security teams the same kind of focused support the NFL provides to their officials, coaches and teams. The job is challenging. The stakes are high. And they “only need to be wrong once.”

Why Machine Learning is Integral to Maintaining Trust with Your Customers Part 2

Insights

Why Machine Learning is Integral to Maintaining Trust with Your Customers Part 2

If you have good data, if you’re monitoring your ML, and if you pair it with great people, then you’re much better off in protecting your institution as cyberthreats continue to involve.

Why Machine Learning is Integral to Maintaining Trust with Your Customers Part 1

Insights

Why Machine Learning is Integral to Maintaining Trust with Your Customers Part 1

Artificial intelligence and machine learning are terms that are used so frequently these days, it’s not clear what they even mean anymore, what’s real, and what’s not… and this is coming from someone who’s worked in the space for quite some time.

Cybersecurity Executive Order Mandates Certain Organizations Boost Their Defenses Against Cyberattacks

Insights

Cybersecurity Executive Order Mandates Certain Organizations Boost Their Defenses Against Cyberattacks

The Biden administration has issued one of the most wide-reaching orders mandating that most federal agencies must patch hundreds of cybersecurity vulnerabilities considered major risks for damaging intrusions into government computer systems. What does this mean for your financial institution?