Contact

Is Zero Trust Attainable If You’re Not Google?

Zero Trust as a concept has become almost fashionable, if not perceived to be routine, with the consequence of setting an unrealistic expectation that it is a table-stakes capability for any organization serious about cybersecurity. In part this is driven by the natural erosion of the security perimeter as more users work from anywhere and […]

Read More
icon / insight Created with Sketch.
Insight

“D&I” is Only Half of the Equation

Given the recent social challenges in our country, many organizations are turning attention to their Diversity & Inclusion programs with renewed focus. Improvements and action plans are beginning to take shape, from new employee groups and open forum discussions to seminars on implicit bias and training on microaggressions. However, few organizations recognize the breadth of […]

Read More
Created with Sketch.
Position Paper

Passwords: The Human-defined Firewall

Why using ‘P@55w0rd’ may not be as effective as you think and how to set better passwords. In 2018, British Airways announced that a major security breach had exposed the personal data of 565,000 customers. The airline confirmed that over a two-week period, hackers were able to gain access to names, addresses, email addresses, credit […]

Read More
Created with Sketch.
Position Paper

Management Styles for a COVID World

COVID-19 has forced organizations to adapt to a new normal and face new pressing concerns. One of these priority concerns is how to optimally engage a recently transitioned remote workforce to boost team morale, drive efficiencies, and protect corporate culture. Although seemingly daunting, organizations can take actionable steps to lead from afar to ensure organizational […]

Read More
icon / insight Created with Sketch.
Insight

COVID-19 Impact on Financial Planning & Analysis

The impacts of COVID-19 have catalyzed businesses to rethink current operations and unlock enterprise value by improving financial processes. The U.S. economy is projected to contract by nearly 6% in 2020 due to the coronavirus pandemic, twice the 2.9% contraction of the 2008 meltdown. Successful organizations thrive during economic downturns due to preparation and rapid […]

Read More
Created with Sketch.
Position Paper

Thinking Twice Before Using 2FA

Why Two-Factor Authentication is Quickly Becoming Obsolete 2 Factor Authentication (2FA), a form of Multi-factor Authentication (MFA) or Multi-Step Verification, adds another layer of security, supplementing the username and password model with a code that only a specific user has access to (typically sent to something they have immediately to hand). It has quickly become […]

Read More
Created with Sketch.
Position Paper

The Value of Documented Cybersecurity

Leveraging Proactive Documentation as a Cost-effective Solution The latter half of this past decade saw a record number of cybersecurity failures. The biggest breaches had headline-grabbing impacts and heavy financial costs. In 2017, The Equifax hack exposed the personal information of 143 million consumers, and Equifax itself lost $4 billion in stock market value by […]

Read More
icon / insight Created with Sketch.
Insight

The New Cyber Landscape: COVID-19 & Working From Home

With cases of the Novel Coronavirus (COVID-19) causing a devastating global impact, employees and contractors have been forced into remote working situations to deliver both mission critical and day-to-day tasks. This unprecedented shift to telework has brought cybersecurity to the forefront of enterprise threats and challenges. DayBlink has identified some of the top threats that […]

Read More
Created with Sketch.
Position Paper

Building a Culture of Threat Modeling

The growth and complexity of modern cyber threats has led cyber-forward enterprises to implement practices that predict the techniques of their adversaries. Sophisticated information security teams are increasingly adopting proactive measures to understand the landscape of potential security threats and adapt accordingly. What is a Threat Model Threat modeling is a structured approach for reviewing […]

Read More
icon / insight Created with Sketch.
Insight

Mitigating Business Email Compromise Risk: Tax Season Security Tips

    ABOUT THE AUTHORS Martin Badinelli is a Consultant within DayBlink’s Cybersecurity Center of Excellence. Michael Morgenstern is a Partner and Practice Lead of DayBlink’s Cybersecurity Center of Excellence and is based in the Vienna, Virginia office 

Read More