Why Auto Dealerships are prime targets for cyberattacks (15% of all Dealers have been breached): Aging technologies and infrastructure that are no longer supported by the manufacturer Technology staff that can’t keep pace with staying focused on cybersecurity objectives or skillsets Employees who...
Resources
News
View All
Videos/Podcasts
View All
Detecting Ransomware in 2024 (The Backup Wrap-up Podcast)
In this episode of The Backup Wrap-up, guest cybersecurity expert Dr. Mike Saylor, CEO of Blackswan Cybersecurity and Professor of Cyber Forensics at UTSA, shares critical strategies for identifying and mitigating ransomware threats. Dr. Saylor discusses a range of tools and technologies,...
Business Impact Analysis: Your Key to Resilient Operations
In this episode of The Backup Wrap-up, we dive into the essential process of conducting a business impact analysis (BIA) and why it's vital for organizations of all sizes. Dr. Mike Saylor, CEO of Blackswan Cybersecurity and Professor at UTSA, offers key insights into executing effective BIAs and...
The Cybersecurity Startup Lessons NOBODY Tells You!
Dr. Mike Saylor, CEO of Blackswan Cybersecurity and a cybersecurity professor at UT San Antonio, shares his cybersecurity startup experiences with This Dot Media -- from launching his first computer business to running a thriving cybersecurity firm. He talks about entrepreneurship, the hurdles...
Threat Advisories
View All
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability (CVE-2024-49112)
SUMMARY Critical RCE vulnerability affecting the Windows LDAP Client with a CVSS score of 9.8. This vulnerability could allow an unprivileged...
Threat Advisory *CRITICAL* – Storm-0501 Ransomware Threatens Hybrid Cloud Environments
SUMMARY The threat actor group Storm-0501 has been launching ransomware attacks against government, manufacturing, transportation, and law...
HPE Aruba Access Points Vulnerable to RCE
SUMMARY Hewlett Packard Enterprise's (HPE) Aruba Networking recently patched three critical vulnerabilities in its Aruba Access Points’...
Flyers
View All
Auto Dealers are Prime Targets for Cyberattacks
Why Auto Dealerships are prime targets for cyberattacks (15% of all Dealers have been breached): Aging technologies and infrastructure that are no longer supported by the manufacturer Technology staff that can’t keep pace with staying focused on cybersecurity objectives or skillsets Employees who...
Multi-Signal MDR — The Blackswan Advantage
Lower Your Business Risk with Blackswan Cybersecurity Boost your cybersecurity operations and safeguard your business from...
BATTLECARD: Blackswan’s OpenXDR vs. LogRhythm
Blackswan’s OpenXDR vs. LogRhythm Blackswan’s OpenXDR platform (Stellar Cyber) delivers critical advantages over...
Blogs
View All
CISO’s Guide to Presenting Cybersecurity Metrics to Board Members
How to Use 3 Key Vulnerability Assessments to Present Cyber Security Threats Board members are increasingly recognizing cybersecurity as a top concern. Harvard Business Review surveyed 600 directors and found that 76% of board members believe they have made adequate investments in cybersecurity....
Navigating Uncertainty: An Essential Guide to Organizational Risk Assessments
Author: Tangela Sampson (Intern, Spring 2024) Introduction to Risk Assessments A Cybersecurity Risk Assessment is a structured and comprehensive procedure implemented within an organization to identify, evaluate, and manage potential risks, threats, or vulnerabilities originating from the...
Unveiling Risk: A Look into the Methodology and Importance of Vulnerability Assessments
Unveiling Risk: A Look into the Methodology and Importance of Vulnerability Assessments Author: Tangela Sampson (Intern, Spring 2024) A vulnerability assessment is a process of identifying security deficiencies and evaluating and categorizing potential vulnerabilities in an organization’s...