Author: Vashti Talwar

According to the 2019 MidYear QuickView Data Breach Report, the first six months of 2019 saw 3,800 publicly disclosed breaches exposing an incredible 4.1 billion compromised records. Though a majority of these breaches had a moderate or low severity score, no organization is too small to be on the...

It’s time for another “ECHO Star” blog. This month’s ECHO Star is Hristo Yordanov, a dedicated system engineer who is looked upon as the in-house security expert. During his four-year (and growing!) tenure at ECHO, Hristo has proven to be one of our most dependable and technically knowledgeable security experts that we have! He is...

This month there are 61 unique CVE’s, 10 critical and 1 being exploited. Out of these we pay close attention to CVE-2019-1367 . CVE-2019-1367 | Scripting Engine Memory Corruption Vulnerability A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory...

We’ve been doing the ECHO Star blog series for a few months now, and with each new post, we have tried to reacquaint both you (our clients) and us with some of the amazing people that work at ECHO. These are the people who always go the...

This month there are 80 unique CVE’s, 2 exploited or disclosed and 3 public. The most pressing issues this month are CVE-2019-1214  and CVE-2019-1215. Both are elevation of privilege (EoP) vulnerabilities. These types of vulnerabilities are usually exploited by malware to gain the ability to...

#ISSUE: Inadequate IT Infrastructure, Systems and Processes Biotech startups tend to focus all or a major portion their resources on R & D, clinical trials and advanced lab systems, letting their IT systems and infrastructure take a back seat not realizing how counterproductive or even fatal this misstep can...