1. By Peter George, President and CEO We’ve been busy here at Fidelis. How busy? Well, you can measure it any number of ways. One important metric is growth. During the first nine months of the year, Fidelis grew revenue 52 percent on a year-over-year basis. A second important metric is who we ar … READ MORE

  2. In our last post we examined the best practices in responding to a cyberattack with a from-the-trenches case study. We close out this series with hard-hitting, practical advice on mitigating cyberattacks from guest contributor, Brian Kelly, Chief Security Officer with Rackspace. Concerned about … READ MORE

  3. As President Xi wraps up his tour in Britain, news continues to circulate around the Chinese government arrest of hackers suspected of conducting commercial cyber espionage against U.S. companies.The arrests allegedly occurred two weeks prior to Xi’s visit to the United States,a period when th … READ MORE

  4. In our last post,we focused on knowing the enemy. In this installment we explore the best practices in responding to an attack by an advanced persistent threat (APT) actor with a from-the-trenches incident response case study. Responding to an incident requires careful orchestration. You have to … READ MORE

  5. Recently, Apple stated its opposition to a controversial cybersecurity bill in which initial amendments passed today in the Senate. The Cybersecurity Information Sharing Act (CISA) has been marketed as the most important, comprehensive and viable bipartisan bill tackling cybersecurity [this legi … READ MORE

  6. Driven in part by the onslaught of high-profile data breaches, such as Target, Sony, Anthem and Ashley Madison, the European Union (EU) is reforming its data protection legislation. The “General Data Protection Regulation (GDPR)” will replace the 1995 Data Protection Directive and is expected … READ MORE

  7. According to recent Interpol findings, cybercrime originating from Russia and Eastern Europe continues to increase, as attackers broaden their capabilities and gain technical sophistication. Recent headlines reveal the sophistication and stealth behind the global attacks to financial, government … READ MORE

  8. My last post introduced Fidelis Cybersecurity’s effort to empower board members in their battle against cyber attacks by offering real-world counsel regarding the management of incident response via a NYSE-published cybersecurity guide entitled Navigating the Digital Age: The Definitive Cybers … READ MORE

  9. Over the past three to five years, organizations have witnessed cyber attacks growing in scope, complexity, and severity. The nature of cyber attacks has evolved from the theft of financial data and intellectual property to include recent destructive attacks, causing cyber attacks to be seen as o … READ MORE