Ronan

About Ronan Lavelle

This author has not yet filled in any details.
So far Ronan Lavelle has created 22 blog entries.

MITRE ATT&CK for Cyber Resilience Testing

The cyber threat landscape is ever-evolving. Adversaries ceaselessly refine tactics, devise new attack patterns, and exploit zero-day vulnerabilities. Making it progressively challenging for organisations to stay ahead of the curve. Amidst this relentless onslaught, the MITRE ATT&CK framework has become an indispensable tool for strengthening cyber resilience. Offering an all-encompassing knowledge base of adversary behaviours

By |2024-07-04T18:21:06+00:00July 4th, 2024|Blog|Comments Off on MITRE ATT&CK for Cyber Resilience Testing

Automated Cyber Resilience Testing – Why It Matters

Cyber security has become a boardroom priority as the scale and sophistication of cyber-attacks continue to escalate. Ransomware, in particular, has emerged as one of the most devastating threats, inflicting significant financial and reputational damage to organisations worldwide. Keeping Company Boards informed on their organisation's cyber resilience posture against these ever-evolving attacks isn't just good

By |2024-05-16T14:38:05+00:00May 16th, 2024|Blog|Comments Off on Automated Cyber Resilience Testing – Why It Matters

Automated Cyber Resilience Testing and NIS2 Compliance

The European Union's Directive on Security of Network and Information Systems (NIS Directive) was adopted in 2016. It aimed to achieve a high common level of cyber security across EU member states. The recently approved NIS2 Directive (Directive (EU) 2021/2034), which began enforcement in January 2024, builds on the foundation laid by its predecessor. It

By |2024-05-09T11:38:04+00:00May 9th, 2024|Blog|Comments Off on Automated Cyber Resilience Testing and NIS2 Compliance

Automated Cyber Resilience Testing: The Key to DORA Compliance and Beyond

The European Union's Digital Operational Resilience Act, or DORA, is a sweeping piece of legislation reshaping how financial entities in the EU handle cyber security and operational resilience. DORA compliance isn't just a regulatory requirement—it's imperative to safeguard critical financial systems. It also maintains customer trust in the face of relentless cyber threats. This article

By |2024-05-15T14:30:19+00:00May 2nd, 2024|Blog|Comments Off on Automated Cyber Resilience Testing: The Key to DORA Compliance and Beyond

Ransomware Attacks: Break the Cycle – Protect Yourself & Avoid Repeat Strikes

Ransomware is one of the most devastating cyber threats facing businesses today. The financial and reputational damage can be catastrophic, but even more alarming is the trend of repeat attacks. A staggering 78% of companies who pay the ransom get hit a second time, often by the same attackers (Infosecurity Magazine). This raises a crucial

By |2024-02-29T10:24:08+00:00February 29th, 2024|Blog|Comments Off on Ransomware Attacks: Break the Cycle – Protect Yourself & Avoid Repeat Strikes

How To Test Cyber Threats Using MITRE ATT&CK

Introduction Cyber attacks are not only increasing in frequency but also in sophistication. Adversaries leverage advanced tactics and techniques that constantly evolve. In this arms race, the MITRE ATT&CK framework has emerged as a vital tool for cybersecurity professionals, providing a structured knowledge base of real-world adversary behaviors. This article will explore why testing cyber

By |2024-02-17T11:17:14+00:00February 17th, 2024|Blog|Comments Off on How To Test Cyber Threats Using MITRE ATT&CK

How to Assess Your Cyber Risk Posture

A cybersecurity posture encompasses an organisation's overall resilience against cyber-attacks, its preventive protocols, and its capacity to react to emerging threats. Given the increasing numbers and sophistication of cyber threats and hackers, having a well-defined understanding of your organisation's cybersecurity posture is now more crucial than ever. The pressure from both strict compliance standards and

By |2023-11-14T15:13:13+00:00November 14th, 2023|Blog|Comments Off on How to Assess Your Cyber Risk Posture

NSA and CISA Red Share Top Ten Cybersecurity Misconfigurations

National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) released a joint cybersecurity advisory (CSA), NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations, which provides the most common cybersecurity misconfigurations in large organizations, and details the tactics, techniques, and procedures (TTPs) actors use to exploit these misconfigurations. The Top 10

By |2023-10-05T20:42:42+00:00October 5th, 2023|Blog|Comments Off on NSA and CISA Red Share Top Ten Cybersecurity Misconfigurations

Snatch Ransomware: CISA Threat Advisory AA23-263A available for testing in Validato

Snatch Ransomware: CISA Threat Advisory AA23-263A is now available for testing in Validato for all existing customers. The Cybersecurity and Infrastructure Security Agency (CISA) has issued a cyber threat advisory relating to Snatch Ransomware, an emerging Ransomware threat actor that first emerged in 2021 and has so far mainly targeted organizations in the Defense, Agriculture,

By |2023-09-21T10:29:31+00:00September 20th, 2023|Blog|Comments Off on Snatch Ransomware: CISA Threat Advisory AA23-263A available for testing in Validato

Threat-Informed Defense: What Is It and How to Implement It?

Many organizations struggle to gauge the true effectiveness of their security controls. Security measures frequently falter without detection and breaches still have significant consequences. Cybersecurity teams require a proactive and straightforward method to consistently monitor the actual performance of their security programs. To address this issue, adopting a Threat-Informed Defense strategy becomes crucial. Through ongoing

By |2023-10-06T15:23:22+00:00September 18th, 2023|Blog|Comments Off on Threat-Informed Defense: What Is It and How to Implement It?
Go to Top