News

CBI News & Commentary  

Industrial Hacking: How Cyber Crime Went Pro | TheStreet.com

What was once a rebellious teenager has all grown up and gotten a job… except his 401(k) comes in ransomware bitcoins. “We say it’s corporate,” said Steve Barone, founder and CEO of the cybersecurity firm CBI. “We don’t believe, we know, that there’s organized businesses stealing data… China is absolutely doing it nonstop, the Eastern […]
Posted in News, Press

The Geography of a Hack: Where Are Your Cyber Villains Located? | TheStreet.com

Today the stakes have gotten bigger and so have the threats. According to cybersecurity expert Steve Barone, founder and CEO of CBI Risk Management, modern hackers aren’t just skilled. They’re organized, well-funded and incorporated, often operating formally or with corporate clients. Interestingly, what their attack looks like depends a lot on where they live. Read […]
Posted in News, Press

Happiness is having expanded to downtown Detroit, says Steve Barone

Steve Barone is happy as a clam these days, glad he chose downtown Detroit to expand to instead of Southfield. Happy to be joining the Detroit Athletic Club. Thrilled as he takes a visitor on a tour of his new space at 1260 Library St., posing next to a table saw on the second floor […]
Posted in News, Press

CBI Hires SVP of Professional Services

Detroit – CBI, a Michigan-based provider of IT risk management services and solutions, has hired Jim Shaw as SVP of professional services, where he will lead the team from the organization’s new Detroit office. CBI CEO and President Steve Barone made the announcement. Shaw possesses more than 10 years of experience in enterprise technology consulting. […]

Analytical Security: Data-driven analytics a new information security paradigm

CIO Review magazine features CBI’s John Beeskow discussing analytical security and how businesses are leveraging Big Data to provide insight into where threats may exist. Read the full CIO Review feature article here [PDF].  
Posted in News, Press
Malware found pre-installed on some Android devices https://t.co/uXZlORJiWk https://t.co/rNITSLIVX5
Companies have increasing confidence in the cloud and its security capabilities #InfoSec #CloudSecurityhttps://t.co/hg14AWsIDb
Malware, adware, hidden apps & other risks make more than 20 million mobile devices susceptible for attacks… https://t.co/kEmikW1i3t
Who's responsible for disclosing new security vulnerabilities? #InfoSec https://t.co/421bePLUf7 https://t.co/yB59wTELZo
Why small-business owners are easy prey for hackers #InfoSec https://t.co/70i2Zl7MDi https://t.co/1RgbSdRL1X
#ShadowIT continues to expand in organization's environments. Learn more about the risks #InfoSechttps://t.co/zsUACHzdLq
When #Ransomware hits, should a company pay up? https://t.co/XrsBj5G12H https://t.co/DaXCsNoSnA
Who's responsible for disclosing new security vulnerabilities? #InfoSec https://t.co/BTM4lHy6i1 https://t.co/yUIHUsidDp
#ShadowIT continues to expand in organization's environments. Learn more about the risks #InfoSechttps://t.co/GDzYmDjdhc
Why small-business owners are easy prey for hackers #InfoSec https://t.co/HgxAcbSk0Q https://t.co/Jxtstjkcqp
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/J9JN4XGgGZ
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/ClUE788hbx
#IoT devices continue to expand within organizations. Let's see how organizations hold themselves accountable… https://t.co/25KYcHYwy6
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/SdFVuLD849
#ApplicationSecurity continues to evolve as security teams uncover hidden vulnerabilities #InfoSechttps://t.co/uZjPFeF3hC
#IoT devices continue to expand within organizations. Let's see how organizations hold themselves accountable… https://t.co/GGXfafItLR
#ApplicationSecurity continues to evolve as security teams uncover hidden vulnerabilities #InfoSechttps://t.co/jRBAP3dM5I
#ShadowIT continues to haunt the threat landscape in Cloud security #InfoSec https://t.co/v0VPU98G9L https://t.co/l74YUhZLgY
What are the top three threats CISOs can't yet handle? https://t.co/nPsqH4fqzc https://t.co/atM6whVMeu
Rogue apps plague IT teams. Knowing how many applications are really on your network is crucial #InfoSechttps://t.co/aNFRXz9bHu