Author Archive for: ACS Admin
About Website Administrator
This author has not written his bio yet.
But we are proud to say that Website Administrator contributed 45 entries already.
Entries by Website Administrator
WWCD: Could Conceal Have Stopped Lapsus$?
September 20, 2022 in Blog /by Website AdministratorSeveral multinational companies have been in the news in recent months thanks to being victims of the prolific data extortion group known as Lapsus$. The most recent victims are Uber and Grand Theft Auto videogame producer Rockstar Games. However, Lapsus$ has been in the news for a majority of 2022 with successful attacks on Okta, Microsoft, Samsung, and others. Could these attacks have been prevented?
Former White House CIO Joins Conceal Advisory Board
September 20, 2022 in Press Releases /by Website AdministratorConceal welcomes Theresa Payton, the first female White House Chief Information Officer, veteran cybercrime fighter, entrepreneur and author to the Conceal Board of Advisors.
Podcast Episode 6 – The Vulnerabilities Market: Trends and Outlook
September 19, 2022 in Podcasts /by Website AdministratorIn this podcast, Scott Greaux discusses vulnerabilities, the market outlook, trends and characteristics.
TD Ameritrade Network Interview with Gordon Lawson
September 15, 2022 in Videos /by Website AdministratorConceal CEO Gordon Lawson sits down with Nicole Petallides on TD Ameritrade’s “The Watch List” and shares insights on ransomware and the rise of geo-political cybersecurity threats.
Is America Losing the Quantum Race with China?
September 14, 2022 in Videos /by Website AdministratorYou may not have realized it, but China has been outpacing America in the race to reach the next frontier of critical national security technology: quantum computing. America is finally taking notice. Find out where the U.S. stands in the Quantum Race and what it means to our nation’s security with Alissa Abdullah, PhD, Theresa Payton and Gordon Lawson in our latest Cybercrime podcast.
INFOGRAPHIC: Common Types of Vulnerabilities
September 9, 2022 in Resources, Uncategorized /by Website AdministratorIn the past year, vulnerability exploitation, as the entry point of threat actors, has doubled. To find these vulnerabilities, threat actors are leveraging a wide variety of techniques, including scanning IPs and open ports, crawling for specific services, testing specific CVEs from the catalog discussed above, and running remote code execution.
Are You Ready for Mandatory Cybersecurity Disclosure?
September 6, 2022 in Blog /by Website AdministratorVulnerability exploitation will continue to be a key entry point into your organization’s network. As a result, security teams must explore proactive security measures and tools that can be leveraged to minimize threat actors’ ability to take advantage of a vulnerability. Conceal provides part of the necessary proactive security measures by stopping malware before it has a chance to exploit unpatched vulnerabilities.
Podcast Episode 5 – Cybersecurity has made it to the Boardroom
September 6, 2022 in Podcasts /by Website AdministratorIn this podcast, Gordon Lawson discusses how Board members can prepare their organizations for the new cybersecurity SEC proposed ruling.
“CONCEALing” Browser Context Through our Patented SDN
August 29, 2022 in Blog /by Website AdministratorThreat actors can’t attack you if they can’t find you. With an additional layer of protection, you can make it much more difficult for attackers to trace web activity back to your organization or to find cloud applications and infrastructure that are critical to your business. This protection is what we call the ‘privacy fabric’.