Month: July 2020

Evidence of Compromise – No Fun for CISOs

Meet Ellen. As CISO for a regional bank, she spends her time spreading security awareness, coaching her managers, and supporting the selection of security tools. Ellen doesn’t know that her bank has been compromised, or that a nation-state has been funneling data out of her network with impunity. After three years of pleasant ignorance, Ellen […]

Prevailion’s New Hacker Intelligence Service Provides Full Transparency on Undisclosed Corporate Breaches for Compliance and Auditing Professionals

Corporate network breaches are happening all the time, but finding out about them can be difficult for anyone outside of the company. This lack of transparency poses a significant problem for many interested parties, but it’s particularly challenging for the compliance industry.

More evil: A deep look at Evilnum and its toolset

ESET has analyzed the operations of Evilnum, the APT group behind the Evilnum malware previously seen in attacks against financial technology companies. While said malware has been seen in the wild since at least 2018 and documented previously, little has been published about the group behind it and how it operates.

Woman using tablet pc, pressing on virtual screen and selecting compliance.

How Auditors Can Make Compliance Programs More Effective

When conducting an audit of your cybersecurity plans, it’s important to reassess risk and evaluate whether established policies and procedures are both effective and actionable. To aid in cyber compliance, CSO Online said the updated compliance guidelines issued by the Department of Justice, “has particular relevance to the cybersecurity practices of organizations when it comes […]

Tip of the Spear: Evidence of Breach and Breach Intelligence featured image

Tip of the Spear: Evidence of Breach and Breach Intelligence

Introduction For quite some time we at Prevailion have been speaking publicly to the nature of the differences between Prevailion and other vendors in the threat intelligence market, and for good reason. There are two key concepts at the forefront of every discussion that I and my peers have when discussing who we are, what […]

4 Signs a “Work from Home” Job Offer Is Actually a Scam

With the new world of widespread remote work, you might be especially eager to consider a job offer or listing that promises that you can work from home. But you should be especially cautious, too.

Copyright 2021 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.