kkostreva@guardsight.com

About Katherine Kostreva

This author has not yet filled in any details.
So far Katherine Kostreva has created 130 blog entries.
Advanced Logic Industries GuardSight Partner Q&A

GuardSight Partner Q&A | Mitigating Cybersecurity Risks: Advanced Logic’s Cloud-Based Solutions

2023-05-29T22:45:54+00:00

Since 1991, GuardSight partner Advanced Logic Industries has been delivering IT expertise and results to clients throughout the Mid-Atlantic region. From its roots in network integration, Advanced Logic has grown its services and expertise to meet clients’ changing needs for cloud-powered agility and business continuity. Powered by their Brush Mountain Data Centers, Advanced Logic delivers predictable IT performance with cloud-based Data Protection, (BaaS) Communications,(UCaaS) IT Recovery Readiness, (DRaaS) Security (SecOps) and Cloud Computing (IaaS). ... Read More

GuardSight Partner Q&A | Mitigating Cybersecurity Risks: Advanced Logic’s Cloud-Based Solutions2023-05-29T22:45:54+00:00
GSPBC-1067 - Persistence - Scheduled Task or Job

GSPBC-1067 Persistence – Scheduled Task or Job

2023-05-24T00:05:42+00:00

Scheduled Task/Job Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be scheduled on a remote system, provided the proper authentication is met (ex: RPC and file and printer sharing in Windows environments). Scheduling a task on a remote system typically may require being ... Read More

GSPBC-1067 Persistence – Scheduled Task or Job2023-05-24T00:05:42+00:00

TomCast LIV: Critical Infrastructure

2023-05-23T22:19:31+00:00

Hello, and welcome back to this next TomCast from GuardSight; we are a tactical cybersecurity-as-a-service organization dedicated to helping businesses protect their data, their assets, and their endpoints. Today we are going to discuss critical infrastructure, what it means, and what it encompasses. This is a follow on to the discussion we had a couple of weeks ago regarding municipal security and the doorway municipalities provide into the nations critical infrastructure. Hopefully this ... Read More

TomCast LIV: Critical Infrastructure2023-05-23T22:19:31+00:00
From the Battlefield to Cyber Defense: Top 10 Reasons Why Military Veterans Excel in Cybersecurity

From the Battlefield to Cyber Defense: Top 10 Reasons Why Military Veterans Excel in Cybersecurity

2023-05-11T03:16:37+00:00

Veterans embrace duty, responsibility, accountability, and performance requirements for completing mission objectives making them invaluable in defending against threats and attacks. Approximately twenty-five percent of GuardSight’s workforce are United States Veterans. Many of our GuardSight Veterans were placed in demanding and arduous situations during their military careers, including facing life-and-death realities. From those experiences, they learned to adapt and overcome, transforming dysfunction into function. They help us operate efficiently and accomplish the primary mission objective: protecting ... Read More

From the Battlefield to Cyber Defense: Top 10 Reasons Why Military Veterans Excel in Cybersecurity2023-05-11T03:16:37+00:00
Malverposting: A New Cybersecurity Threat You Need to Know About

Malverposting: A New Cybersecurity Threat You Need to Know About

2023-05-11T03:01:56+00:00

As the world becomes increasingly digital, cybercriminals are finding new and innovative ways to steal personal and sensitive information from unsuspecting victims. One of the latest techniques to emerge is "malverposting," a type of cyber threat that involves the creation of fake online content to distribute malware. Recently, a Vietnamese threat actor made headlines by using malverposting to distribute malware to more than 500,000 victims. The attacker used fake job postings on popular employment ... Read More

Malverposting: A New Cybersecurity Threat You Need to Know About2023-05-11T03:01:56+00:00

TomCast LIII: Municipal Security

2023-05-09T21:37:09+00:00

Hello, and welcome back to this next TomCast from GuardSight; we are a tactical cybersecurity-as-a-service organization dedicated to helping businesses protect their data, their assets, and their endpoints. Today we are going to discuss cybersecurity in municipalities. I was fortunate to have a talk with many state and local government municipal clerks recently, and I wanted to talk for a little while about that particular opportunity. In my opinion, these folks are on ... Read More

TomCast LIII: Municipal Security2023-05-09T21:37:09+00:00
Using Honeypots to Detect and Respond to Cybersecurity Threats

Using Honeypots to Detect and Respond to Cybersecurity Threats

2023-04-25T19:14:42+00:00

Cybersecurity threats are a constant concern for organizations of all sizes and in all industries. As attackers become increasingly sophisticated, organizations must have effective tools and strategies in place to detect and respond to threats as quickly as possible. One tool that can be particularly useful in this regard is the honeypot. Honeypots are decoy systems that simulate vulnerable targets, such as servers or networks, to attract potential attackers. Their purpose is to detect ... Read More

Using Honeypots to Detect and Respond to Cybersecurity Threats2023-04-25T19:14:42+00:00

TomCast LII: Personal Security

2023-04-25T18:38:55+00:00

Hello, and welcome back to this next TomCast from GuardSight; we are a tactical cybersecurity-as-a-service organization dedicated to helping businesses protect their data, their assets, and their endpoints. Today we are going to get away from the organizational viewpoints of cybersecurity or the business-related side of things and talk more personally. Let’s chat about personal cybersecurity. When you think about your network at home, do you think about making it or keeping it ... Read More

TomCast LII: Personal Security2023-04-25T18:38:55+00:00

GSPBC-1066: Initial Access – Replication Through Removable Media

2023-04-25T18:00:08+00:00

Replication Through Removable Media Adversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when the media is inserted into a system and executes. In the case of Lateral Movement, this may occur through modification of executable files stored on removable media or by copying malware and renaming it to look like a legitimate file to trick users into executing it ... Read More

GSPBC-1066: Initial Access – Replication Through Removable Media2023-04-25T18:00:08+00:00
From SolarWinds to Capital One: Why Cybersecurity is Critical Today

From SolarWinds to Capital One: Why Cybersecurity is Critical Today

2023-04-07T03:55:22+00:00

Cybersecurity incidents are becoming increasingly common, and in the past three years, several high-profile attacks have made headlines around the world. From the SolarWinds supply chain attack that compromised sensitive data belonging to many organizations and government agencies, to the Colonial Pipeline ransomware attack that caused significant disruption to fuel supplies, and the Capital One data breach that exposed the personal information of millions of customers, these incidents have had far-reaching consequences. In this ... Read More

From SolarWinds to Capital One: Why Cybersecurity is Critical Today2023-04-07T03:55:22+00:00