NormShield Blog

cyber security risk brief 2018

How hackers leverage your IP addresses? IP Reputation as a Cyber Risk Assessment Metric

IP Reputation can be used as a cyber risk assessment metric to better understand how hackers leverage and exploit your IP addresses listed in websites used by hackers. What is IP Reputation? Employees may download applications that compromise computers and network. As a result, IP address can become part of a hacker’s network and hosting […]

cyber security scorecard posture

Cyber Risk Scorecard: A Compact View to Your Cyber Security Posture

Is there a way to see your cyber risk in a compact report? Yes there is, it is called cyber risk scorecard. Many companies use public and private tools to assess their cyber risk, but it requires processing of data gathered from many different sources and analysis and contextualization ın order to convert data to […]

Rapid Cyber Risk Scorecard

Cyber Security Services: Do Companies Really Need Them?

Cyber security services: a question of debate in our century. The last decade witnessed more technological developments than we ever imagined. In business world, there is almost nothing left to do manually; everything is digital and across networks. Companies that worth thousand and even million dollars are keeping their vital information in these digital networks […]

Malicious JavaScripts

Malicious JavaScripts: How Can You Get Hacked?

Malicious JavaScripts: How Can You Get Hacked? Detecting the vulnerabilities and leaking are of the essence in hacking. That’s why maintaining cyber security is quite crucial for individuals and corporations. In 2017, even a big firm like Yahoo was hacked by a simple phishing e-mail. Equifast -one of the largest credit bureaus- was hacked through […]

Cyber Insurance GDPR

General Data Protection Regulation (GDPR) and Cyber Insurance

The countdown has begun: the General Data Protection Regulation (GDPR) will be applicable  as of May 25th,2018, aiming to strengthen the rights of the citizens of EU on the internet. This regulation will be implemented by the European Union, but it is also interest of  companies located in other countries, including the United States, which […]

memcached ddos attack

Are your assets at risk of being victimized or weaponized in a Memcached DDoS attack?

Two record-breaking DDoS attacks, which used misconfigured Memcached servers for amplification/reflection, created 1.35 Tbps and 1.7 Tbps bogus traffic towards GitHub and an unnamed US-based company, respectively. Even though amplification/reflection DDoS attacks are not new to the cyber security world, the amount of traffic created is terrifyingly huge thanks to misconfigured Memcached servers’ amplification by […]

Risk Management

3rd Party Risk Management

3rd Party Risk Management; Many organizations have been talking about the third-party risk management for years and it is becoming more complex every day and attracting a lot of attention from the regulators. Most organizations have direct and/or indirect spendings on multiple vendors across the globe that make risk management more complex due to dealing with […]

cyber scorecard

Cyber Security Risk Scorecard; Are You Safe or Not?

Cyber Security Risk Scorecard; Today, almost all companies, regardless of the size or the sector, need to rate their cyber security risk. A reliable and actionable security scorecard can assess the risks and show the ways to eliminate the threats. Generating a security scorecard does not require your personal or secret information. Because they use […]

bitcoin exchange safe

Are Bitcoin Exchange Sites Safe?

Are Bitcoin Exchange Sites Safe and What Are the Vulnerabilities? Bitcoin Mania is all over the world. Bitcoin interest has expanded from Wall Street habitues to housewives in South Korea. Bitcoin trading became so popular that several major websites had to pause the admittance of new accounts. Cyber security is naturally a significant part of this […]