top of page
Search


News Tangles Over Facebook's Massive Outage
This part of the Facebook outage saga is rooted in claims from online posts that lack tangible proof and therefore remain unverified.

Wembley Partners
Jan 12, 20225 min read
33 views
0 comments


Windows Subsystem Under Attack After Warning Dismissed
The case serves as a perfect example of when theoretical attack scenarios and proof-of-concepts developed by researchers go unheeded.

Wembley Partners
Dec 21, 20215 min read
112 views
0 comments


US Dept. Of Commerce Clamps Down On Sales Of Commercial Hacking Tools
The rule to change how US companies engage in sales of hacking tools designed to penetrate digital devices to conduct surveillance.

Wembley Partners
Nov 30, 20213 min read
23 views
0 comments


It’s Time to Patch Up: US Federal Agencies to Fix Critical Cybersecurity Flaws
Whatever the reason is, the new directive by the Biden Administration carries the impression that cybersecurity has finally taken priority.

Wembley Partners
Nov 26, 20214 min read
29 views
0 comments


Bug Bounty Program: When Businesses Collaborate With Hackers
To a hacker, there is no greater opportunity than to hack what is thought to be unhackable.

Wembley Partners
Nov 11, 20214 min read
50 views
0 comments


Insider Threats: When Trust Is Broken
A great colleague, a malicious insider, or both? A deeper look into insider threats and the associated attack vectors.

Wembley Partners
Aug 26, 20216 min read
60 views
0 comments


NIST, ISO, COBIT, ITIL – Which Cyber Framework Rules Them All?
Which is the best among the four major cybersecurity and risk management frameworks that foster efficient cyber protection?

Wembley Partners
Jun 18, 20214 min read
6,488 views
0 comments


Cylera and Wembley Partners Team Up To Tackle IoT Cyber Attacks Threatening Canadian Businesses
Wembley Partners Ltd., and Cylera, Inc. have entered into a strategic partnership to help Canadian businesses combat IoT cyber threats.

Wembley Partners
Jun 3, 20213 min read
64 views
0 comments


What are the Use Cases for Cyber Threat Intelligence?
We've discussed Cyber Threat Intelligence in depth this May. Now, let's talk about specific areas where CTI makes a meaningful difference.

Wembley Partners
May 28, 20215 min read
84 views
0 comments


The 3 Flavors of Cyber Threat Intelligence
We’ve discussed what Cyber Threat Intelligence is, and the various processes involved in its lifecycle. But not all CTI is made equal.

Wembley Partners
May 19, 20214 min read
45 views
0 comments


Cyber Threat Intelligence is Just Information Collection, Right?
There is a fine line between information and a useful piece of intelligence data. Let's see how they differ, and why that matters.

Wembley Partners
May 14, 20214 min read
81 views
0 comments


So, We Have A Cyber Incident Response Program. What’s Next?
While having a decent Cyber Incident Response Program is absolutely essential, it's not a panacea. How can you boost its effectiveness?

Wembley Partners
Apr 29, 20214 min read
30 views
0 comments


Components of a World-Class Cyber Incident Response Program
You've heard the term. But what does a truly world-class Cyber Incident Response program look like?

Wembley Partners
Apr 22, 20213 min read
95 views
1 comment


Whose Job is it to Respond to Cyber Incidents Anyway?
It is a common misconception to perceive cyber defense as a purely technical matter. The reality is, cybersecurity is a holistic function.

Wembley Partners
Apr 15, 20215 min read
98 views
0 comments


What Is a Cyber Incident Response Program and Do I REALLY Need One?
You’re preparing to leave the office on a cool Tuesday afternoon when your desk phone beeps. It’s your IT guy, and it isn't good news.

Wembley Partners
Apr 8, 20214 min read
70 views
0 comments
bottom of page