
It seems like not a month goes by without reports of data breaches involving passwords. It seems like there’s no hope to be had in constructing strong passwords. Over the past few years, you may have noticed this xkcd comic floating around the…
It seems like not a month goes by without reports of data breaches involving passwords. It seems like there’s no hope to be had in constructing strong passwords. Over the past few years, you may have noticed this xkcd comic floating around the…
Chinese hackers have given U.S. companies a reprieve for more than a year. But, does the hack of the National Foreign Trade Council signal a return to Chinese IP theft? Or does it signal a broader strategic shift? In April 2017, a cybersecurity…
Situation Report GRA Quantum is actively monitoring the rapid proliferation and widespread impact of the WannaCry ransomware campaign (also known as WannaCrypt, WCry, or WanaCryptor) that disrupted operations around the world, and we are fervently spearheading clients’ incident response efforts. This Situation Report…
Cyberespionage should best be understood within the framework of conventional espionage. The growing connectedness of the world and an overall lag in the development of cybersecurity tools and tactics relative to cyber weapons has made the digital frontier the latest and greatest stage…
It’s that time of year again. The 2017 Verizon DBIR is out and information security professionals are scouring the pages for insights and best practices to bring to their organizations. This year’s “InfoSec coddiwomple” offers many of the staple features they’ve reported on…
Consumers care about security and privacy. The U.S. should embrace a cybersecurity nutrition label to inform customers, unlock their latent preference for security, and fix the cybersecurity market failure The resilience of the United States to cyberattacks is dangerously low. Cyberattacks continue to plague…
New York, NY – GRA Quantum is proud to be a contributor of data and analysis to the Verizon Data Breach Investigations Report (DBIR) for the second consecutive year. The DBIR presents authoritative insights on the specific cybersecurity challenges faced by major industries. This year, the…
Technical Surveillance Countermeasures (TSCM) prevent, detect, and neutralize the threats that eavesdropping and surveillance devices pose to organizations. TSCM is a service that prevents, detects, and neutralizes the threats that eavesdropping and surveillance devices pose to organizations. These days, the physical security of…
As networks and endpoints have hardened, hackers have turned to time-tested exploitation of human psychology. Whether in the digital or physical realm, neglecting the risks of social engineering could put companies in a precarious position. In a previous blog post, we described…
It’s important to develop a tailored physical security strategy to protect your assets. Many of our blogs are related to cybersecurity, but security in the physical world is just as important. Like cybersecurity, learning how to thwart a variety of physical threats…