How to Create Smarter Risk Assessments
July 29, 2019
8 Vulnerabilities Penetration Testers Recommend You Address in 2019
February 7, 2019
Penetration testers are the frontline witnesses on cyber threats and vulnerabilities. They continue to see the same weaknesses and vulnerabilities within the enterprises they examine. Below, is a list of recommendations for you to be aware of in the year ahead.
HALOCK Helps Define “Reasonable” Risk: The Questions a Judge Asks You after a Data Breach
February 5, 2019
CRAIN’S Cyber Security Roundtable: Protecting Data in An Era of Vulnerability featuring Chris Cronin
October 23, 2018
Insightful discussion with Chicagoland information security experts in Crain’s Roundtable.
Cyber Security Summit: Chicago CIS RAM & Duty of Care
August 30, 2018
A key method that was showcased at the event was the practice of ‘duty of care‘. That is, businesses should assess their security controls to ensure that all parties are protected from potential harm.
HALOCK Security Labs Pledges to Support National Cybersecurity Awareness Month 2018 as a Champion
August 20, 2018
Security Magazine: Who in an Organization is Responsible for a Data Breach?
August 2, 2018
“While accountability starts with the CEO and corporate board, cyber security is a shared responsibility across every function and level of an organization.” – article in Security Magazine. Read more on how information security professionals must be aligned when it comes to security safeguards.
June 19, 2018
HALOCK Annual Outing at Arlington Park
June 15, 2018
Schaumburg firm HALOCK celebrates over 20 years as an information security firm at the annual outing at Arlington Park. This year is quite special, as HALOCK co-developed with CIS® (Center for Internet Security), CIS RAM, an information security risk assessment method that helps organizations implement and assess their security posture against the CIS Controls cyber security best practices.
NetDiligence® CyberRisk Summit
June 1, 2018
Why a Chicago-Based Cyber Security Firm Just Released its Prized IP.
April 14, 2018
It was the right thing to do
My employer, HALOCK Security Labs, just gave away our highly valuable intellectual property. For years, we have been developing and improving a method for assessing cyber risk that acts as a universal translator for executives, regulators, judges, attorneys, and subject matter experts. The method, “Duty of Care Risk Analysis” has been very advantageous to us as we described our services to our clients.
CIS RAM Puts the CIS Controls™ into Action
April 4, 2018
CIS Controls™ Version 7 Launched
March 19, 2018
A panel including Greg Johnson, Vice President and Assistant General Auditor of the Federal Reserve Bank and Chris Cronin, a partner in HALOCK Security Labs discussed the CIS Controls V7. Learn more about the CIS Controls and risk assessment method, CIS RAM.
Your Spring Break Checklist: Cyber Edition
March 10, 2018
by Glenn A. Stout Ph.D., CISM, GSEC, PMP
As families prepare to take to the beaches, resorts and other vacation spots all over the world, bad actors area also preparing their various attacks on the unsuspecting. Use this vacation checklist to keep you cyber safe.
Women in Cybersecurity Conference (WiCyS) in Chicago
March 10, 2018
The Women in Cybersecurity Conference (WiCyS) will be held in Chicago on March 23-24 and HALOCK is a proud sponsor of this important event. WiCyS is a community in which women in the cyber security field can engage, encourage and support one another in order to empower not only themselves, but also the cyber security industry at large.
Equifax breach fuels digital mortgage doubts
September 20, 2017
Digital mortgages are improving the borrowing experience for consumers, but they may also complicate fraud risks stemming from the Equifax data breach.
Stronger security and disaster planning fuel healthcare’s migration to the cloud
August 15, 2017
New cost reductions make cloud options more compelling than ever but, in a twist, experts say cloud platforms can be more secure than managed data centers.
7 Tips to Protect Against Ransomware
June 14, 2017
Ransomware is one of the most insidious and diabolical weapons in a hacker’s arsenal because it effectively locks you out of your entire network — until you pay the ransom, that is.
10 Myths About Risk Management
March 16, 2017
The following guide points out 10 of the most common myths organizations have when it comes to cyber security risk management and compliance, as well as the facts. Knowing the difference between the two may be critical for your company as you navigate the often difficult-to-understand nature of today’s cyber security and compliance landscape.
How Safe Is Your Mortgage?
October 25, 2016
Mortgages can be problematic and even unsafe in a number of ways. Learn what to look out for and how to reduce your risk.