Jessica Grube

Jessica Grube is a Senior Security Engineer and vulnerability risk management expert at CyberMaxx.
Find me on:

Recent Posts

Microsoft Warns This New Vulnerability Could Lead To The Next WannaCry

Posted by Jessica Grube on May 16, 2019 3:45:36 PM

Microsoft is warning that an exploit with the magnitude of the WannaCry attack that crippled computers worldwide two years ago could be imminent if people fail to patch a high-severity vulnerability. 

Read More

Topics: cybersecurity, cyber attack, wannacry, microsoft, vulnerability

Do You Need Vulnerability Risk Management?

Posted by Jessica Grube on Apr 4, 2019 1:22:38 PM

Across the globe cybersecurity teams work around the clock to keep up with scanning and patching vulnerabilities, and identifying threats.  This form of Vulnerability Risk Management is becoming a top priority within IT security teams.

As such, more and more risk personnel are reaching out to vendors of VRM to help with vulnerability management and the struggle to reduce security cyber risk. But do you really need a vulnerability risk management solution?

Read More

What is Vulnerability Risk Management and Why Do You Need It?

Posted by Jessica Grube on Apr 3, 2019 10:43:51 AM

Today there are more devices connected to the internet than there have ever been before – an inconceivable number of connections. An ever-growing rate of connections provides more and more opportunities for hackers to exploit digital vulnerabilities. In this blog post, we'll discuss why VRM has never been more of a priority in the realm of cybersecurity.

Read More

Topics: vulnerability risk management, VRM

5 Cybersecurity Policy Necessities for Responding to a Network Intrusion

Posted by Jessica Grube on Mar 4, 2019 7:04:00 AM

A Life of Crime

Have you ever considered a life of crime? If so, cyber crime might be a good field for you to take a look at. Many organizations aren’t very good at responding to network intrusion... so you might actually get away with it. Plus, prosecuting cyber criminals is tough to do; evidence against your dastardly deed seldom stands up in court.

When your victim has a cybersecurity policy in place for responding to network intrusion, clues will be hard for them to come by, and even harder to trace back to you.

Read More

6 Questions To Ask When Creating Your Incident Response Strategy

Posted by Jessica Grube on Feb 22, 2019 10:59:30 AM

With cybersecurity attacks and costly data breaches on the rise, and a wide range of industries being targeted, companies of all sizes should be preparing for the worst. Just as we prepare for a natural disaster, companies should prepare for a cybersecurity disaster, and in both instances, proper planning, preparation and practicing potential scenarios is key.

Read More

Topics: Blog, cybersecurity, incident response, tabletop exercises, data breach, cyber attack

Download Report

Cybersecurity Central

Knowledge is power.

When it comes to ever-changing advanced cybersecurity threats facing organizations today, knowledge is power. We're here to arm you with everything you need to know to become the security leader you strive to be.

Sign up for the CyberMaxx newsletter to stay up-to-date on:

  • The latest cybersecurity news
  • Need-to-know threat intelligence
  • Insight from industry leaders
  • And more


Subscribe Here!

Recent Insight