White Papers

2018 3rd Party Cyber Risk Report

May 2018
3rd Party Cyber Risk ReportMatt, CISO of a large company, comes to office on Friday. He is a very successful Chief of Information Security Office and he is very confident of capabilities of his team. They handle all vulnerabilities inside their own system, continuously scan and monitor their system, they use cutting-edge security tools such as firewalls, WAFs, IDS/IPS, and Data Leak Protection technologies.

The cyber security awareness of the employees is quite high and they do everything to avoid phishing-type attacks. The possibility that something goes wrong is very low. However, that Friday morning, when Matt looks at online news, he shockingly discovers that many of their client information is leaked.

Download White Paper

Is Your Money Safer in Cryptocurrency Exchange Markets than Banks?

April 2018
White Paper NormshieldCrypto coins are the new mean of investment and shopping and their exchange volume increases exponentially. There are many exchange markets handles these investments.

However, the question of resiliency of these markets is on the rise with recent attacks. In 2014, one of the largest crypto coin exchange market, Mt. Gox which was handling 70% of all bitcoin transactions back then, was hacked and lost $473 million resulting its closure and most dramatic fells in BTC. In 2016, Bitfinex suffered due to a cyber attack resulted in 120,000 BTC (≈$72 million back then). In January 2018, as the biggest cryptocurrency hack, more than half billion dollars was stolen from Coincheck.

Download White Paper

2018 Cyber Security Risk Brief

April 2018
cyber security risk briefWe analyzed more than 100,000 live assets from over 200 companies to find out which industries are at the head of the class, who needs to get their grades up, and the threats that everyone needs to address.

Trends and Insights from Cyber Risk Scorecard Key Data Points Includes detailed external security risk data from cyber risk scoring for: 5127 organizations across multiple industries. Over 1,000,000 active assets on the Internet, including web and network devices.

When DNS is compromised by a hacker, a user’s legitimate application request is redirected to a different network host, possibly with malicious intent…

Download White Paper