Category: Security

author:

Security

Neglect These Cybersecurity Fundamentals at Your Peril


“Shiny object syndrome” exists within both the IT and cybersecurity fields. The press loves to focus on the sleekest new security toys or the latest threat-hunting technique. After all, red-team/blue-team simulations and advanced threat hunting sound cool and impress at networking events. However, for …



author:

Security

Help Protect Your Company From a Data Breach


It’s likely no surprise to anyone that the amount of data collected, stored, and analyzed continues to grow exponentially across the globe. From a security perspective, it’s always important to minimize the amount and sensitivity of data stored, but the reality is, if the …



author:

Security

A Frank Discussion of Multifactor Authentication


Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out targeted phishing emails to compromise even more accounts or trick employees into handing over sensitive data. To combat …


author:

Security

IT Operations: How SecOps Saves the Day


Few messages strike fear in the hearts of IT operations staff like the dreaded scan results from your security team. These messages often appear in your inbox early on Monday morning, which means it’s sitting there waiting for you. You’re not even into your …



author:

Security

Moving Toward More Proactive Cybersecurity


As the cyberlandscape continues to evolve, so do the methods of attack used by cybercriminals. And it isn’t just outsiders you have to worry about; insiders can be responsible for data breaches too. Given all the moving pieces, it’s no wonder the state of …


author:

Security

Three SIEM Must-Haves


Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip past defenses. According to the recent Ponemon 2018 Cost of a Data Breach report, …