by Taylor Hying, Julie Mirman and Ari Baranoff | Aug 20, 2024 | Internal Fraud, Internal Wrongdoing
Last year, we wrote about the use of AI for generating fake social media accounts and in proliferating social engineering attacks. We cited the use of captured voice recordings to clone voices for use in fraud, kidnapping scams and other illicit activity. The...
by Timothy Desrochers and Ari Baranoff | Mar 26, 2024 | CyberSec
A little history of the Cybersecurity Framework. The National Institute of Standards and Technology (NIST) recently released the much-anticipated version 2.0 of the Cybersecurity Framework (CSF), first published in 2014. The CSF was originally developed in response to...
by Timothy Desrochers | Apr 17, 2023 | CyberSec
It’s hard to read any technology blog or article today without seeing a reference to some Large Language Model (LLM) like GPT4 or Google Bard. But what do these LLMs mean for an enterprise and are they secure? Are they practical for everyday use cases or is this...
by Antonio Piraino and Ari Baranoff | Sep 30, 2022 | Business Continuity, CISO
Hurricane Ian and the path of its destruction serves a reminder of the importance of Business Continuity and Disaster Recovery Planning (BCPDR). For many, the thought of putting together such a plan seems like a daunting task. For others who have established BCPDR...
by Erik Rasmussen and Ari Baranoff | Jan 14, 2022 | CISO, CyberSec
As a business owner, your growing concerns regarding the likelihood of a cybersecurity event were certainly validated over the course of this past year. According to security researchers, the average ransomware payment in 2021 rose to a record $570,000 and the...
by Ari Baranoff | Dec 6, 2021 | CyberSec
CISA – How Does Multi-Factor Authentication Work?
by Ari Baranoff | Dec 6, 2021 | CyberSec
NIST – Cybersecurity Framework Profile for Ransomware Risk Management
by Ari Baranoff and Jared Topman | Feb 23, 2021 | Internal Fraud, Open Source Intelligence
Open Source Intelligence (OSINT), involves the collection and analysis of publicly available information. OSINT was first employed by the United States Foreign Broadcast Monitoring Service (FBMS) and quickly became an integral part of U.S. intelligence after the...
by admin | Jan 7, 2021 | Uncategorized
CISA Mitigation – Houses of Worship
by Ari Baranoff | Jul 13, 2020 | Covid, Fraud
Covid-19-Benchmarking-Report Download