You’ve been hacked… Now what? – The “Don’t Try This At Home” Response Guide.

Photo courtesy of CSO Online When your organization is experiencing a cyberattack or breach, protecting privileged information and intellectual property is crucial.  As Incident Responders, we can state clearly that in the aftermath of a data breach, events can move very quickly. You'll be asked a litany of questions such as, "how.., who.., why.., etc..". It's best to be prepared. However, appropriate steps should be taken to ensure that confidential and strategic plans are secured and held with great discretion.  As we too often see, shortcuts taken for the sake of getting back to "normal" can lead to greater problems later, particularly in the event of litigation.  Here are our top tips for protecting sensitive data in the context of a data breach: Don't keep your incident response plan on the servers! If the servers are infected with ransomware, it might be impossible to access the plan. Print the plan…


Critical Path Security includes MalwareBazaar in Zeek Automated Feeds

Critical Path Security has a strong belief in community involvement to solve global challenges. In that light, Critical Path Security is now including all major Abuse|ch data into our Zeek-formatted Threat Feeds. With the inclusion of Malware Bazaar, every Zeek or Léargas Security Platform user can have up to the minute threat intelligence covering the major malware delivery points! We are thrilled to integrate Abuse|ch data and their incredible infrastructure that: consists of around 50 servers and 200 sandboxes generates over 130TB network traffic per month answers around 2,000,000 API requests per day handles almost 300,000,000 HTTP requests per month generates 80GB of data - every day Additionally, Critical Path Security is looking at additional ways to support Abuse|ch and the rest of the intelligence community and we are excited to share those announcements as they come along. It has long been our goal to provide an unparalleled degree of…


Critical Path Security places 1st in fundraiser for The Children’s Haven!

The Mission of The Children's Haven is to promote the health and happiness of children impacted by abuse. They are committed to building successful children by providing programs that ensure their safety, advocate on their behalf and respond to meet their needs. At Critical Path Security, we couldn't be more proud of the opportunity to help move that mission forward! Thanks to our incredible customers, partners, and staff who raised a recording setting amount of resources for the children! We look forward to the impact we can have in 2021! -Patrick

Comments Off on Critical Path Security places 1st in fundraiser for The Children’s Haven!

How Well is Remote IT Really Working? – Interview with Patrick Kelley

Last week, Brian Meek sat down with Patrick Kelley and asked the following questions in regards to How Remote IT is really working for teams around the world. Patrick provided the following insight. Brian: Is remote IT a long-term trend or simply an emergency tactic? Patrick: I believe much of the reactionary remote workforce will return in 2021. In the short term, a fully remote workforce can be an effective answer to an emergency. However, the long-term, negative psychological impacts of a fully remote workforce are too significant to ignore. As the line between home and work begins to blur, the hours required to support a remote workforce become less defined. This makes capacity planning for support teams more challenging. Brian: What kind of metrics should IT consider using to gauge how well its remote IT workforce is performing? Patrick: That's a great question. I would recommend that IT and…

Comments Off on How Well is Remote IT Really Working? – Interview with Patrick Kelley