Lock sitting on a keyboard with dramatic lighting
How to decrypt data from ransomware

What is a decryption key? How is it used? And most importantly, what’s involved when it comes time to decrypt data from ransomware?  For the savvy CISO, understanding how decryption keys are used is vital. But it’s even more important…

Keep Reading
nesting dolls
Malware VS Ransomware: Can AI save the CISO?

AI and ML are promising tools in the cyber security war. Using them to prevent an attack is top of mind for CISOs. But the differences between malware and ransomware make one easy to detect with AI, while the other…

Keep Reading
arrows
Most cybersecurity insurance policies are worthless in 2023.

Cybersecurity insurance policies have been seen by CISOs as a last-resort safety net, but by 2023 that safety will almost entirely be gone. Historically, losses incurred from downtime are reimbursed if tech executives agree to a set of compliance standards…

Keep Reading
Black Hat USA 2022 conference stage
“Unmasking” the Black Hat Conference

Have you ever asked, what is Black Hat? Unlike other technology conferences and the people that attend them, Black Hat is a conference that attracts a unique group of people who sees problems in the world differently than most of…

Keep Reading
cellphone geolocation tracking dots on a map
Is 2000 Mules cellphone data and geolocation accurate?

Political affiliation aside, 2,000 Mules has raised more than its share of eyebrows. One element of the film relies on precise geolocation data generated from cellphones. Fact-checkers were quick to claim it wasn’t possible for filmmakers to collect GPS location data…

Keep Reading
Firmware is the new cybersecurity attack: here’s why

With Russia ratcheting up its cyberattacks against companies in the USA, DHS/CISA has asked enterprise organizations to check and update their firmware. To get ahead of potential challenges, savvy IT leaders are asking when this kind of attack became mainstream,…

Keep Reading
crossed out words reading prevention, detection. The word premonition is not crossed out. Various patterns are behind the text.
Cyber Premonition: The End of the Prevention vs Detection Debate.

The endless cyber debate between prevention and detection may be settled thanks to former NSA Data Scientists. A new method, not yet on the market (but being fast tracked due to new Russian threats), enables security professionals to visualize their…

Keep Reading
How To Get Your CISSP: Part 2

For those new to this series, 3 Tree Tech CTO, Eric Skeens has decided to document every step of the journey to better shed light for IT nerds and executives. For those wondering how to get your CISSP, check out…

Keep Reading
35% of Enterprise Employee Data Is On The DarkWeb.

The dark web is a rich resource for internet scoundrels peddling stolen information, but have you been curious how much of your employee’s data is exposed or how to search the dark web to begin with? You may believe having…

Keep Reading
How To Get Your CISSP

As our own CTO, Eric Skeens goes after his CISSP, he has decided to document every step of the journey to better shed light for IT nerds and executives. For those wondering how to get your CISSP, resources available, and…

Keep Reading