Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

Stop Malicious Insiders with the AAA Framework

Stop Malicious Insiders with the AAA Framework

Stop Malicious Insiders with the AAA Framework A series of tweets rocked the world recently. The following accounts had messages posted to them from a criminal impersonator: Elon Musk - Twitter.com/elonmusk Bill Gates - Twitter.com/BillGates Joe Biden...

Cipher Podcast: Behind the Scenes of Blue Team Operations

Cipher Podcast: Behind the Scenes of Blue Team Operations

Cipher Podcast: Behind the Scenes of Blue Team Operations This topic of this episode is Red vs. Blue Team operations. The team even touches on the new Purple Team concept. Cipher Director of Technology and SOC Manager Ricardo Encinosa explores Blue Teams, which are...

Attack Maps and Cybersecurity: More Than Meets the Eye

Attack Maps and Cybersecurity: More Than Meets the Eye

Attack Maps and Cybersecurity: More Than Meets the Eye What is location? In the real world, it’s where your two feet are. On the Internet, location means your IP address for the most part. Certain behaviors, aside from IP, can reveal your location online. Logging into...

Cipher Podcast: Cybersecurity Tips from a Penetration Tester

Cipher Podcast: Cybersecurity Tips from a Penetration Tester

Cipher Podcast: Cybersecurity Tips from a Penetration Tester Cipher's Portugal CTO Sergio Alves joins the podcast with an eye-opening episode on penetration testing. He covers the difference between a vulnerability assessment and penetration test. Sergio understands...

Investigating a Cyber Attack: Step by Step

Investigating a Cyber Attack: Step by Step

Investigating a Cyber Attack: Step by Step Author: Fernando Amatte, Director of Red Team Services, Latin America​ As a cybersecurity professional, I have my own laboratory with some virtual equipment acquired around the world. The goal is simply to research and...

Cipher Podcast: Cyber Risk Management

Cipher Podcast: Cyber Risk Management

Cipher Podcast: Cyber Risk Management Cipher Director of GRC & Data Protection Officer UK Clive Boonzaaier joins the podcast. He talks about why risk is an issue that should be discussed at the board level. Clive says understanding cybersecurity risks faced by an...

10 Interesting Facts About DDoS Attacks

10 Interesting Facts About DDoS Attacks

10 Interesting Facts about DDoS Attacks A Distributed Denial-of-Service (DDos) attack can bring down an unprepared target. DDoS is often mentioned in the news as an example of a weapon in the hacker toolkit. Recently, Amazon revealed they fought off the largest DDoS...

Cipher Podcast: Top Cybersecurity Skills in Demand

Cipher Podcast: Top Cybersecurity Skills in Demand

Cipher Podcast: Top Cybersecurity Skills in Demand Cybersecurity is an attractive career path. The demand for talented practitioners is strong. The work is interesting. How can someone join the field? Beyond credentials and certifications, there are some core soft...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.