- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Threat Intelligence
- Data Protection
- Regulatory Compliance
- Security Takes a Village
- C-Suite Accountability
- Endpoint Detection and Response
- Cybersecurity News
- Security Hygiene
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
- Success Stories
No Case for Security Budget? Demand Participation Instead
It’s a common misconception across business and industry that cybersecurity is a function performed exclusively by security or IT people. In actuality, virtually all members of staff, including non-technical staff, form part of your cybersecurity protective barrier.
The Role of Artificial Intelligence in Protecting Healthcare Networks
As we all struggle to meet the demands of changing economic conditions and changing threat landscapes, we must realize that we all have a shared responsibility to protect our healthcare system from cyberattacks.
Cybersecurity: It’s Not Just for CISOs Anymore (and Never Was)
The impact of cyberattacks like ransomware aren’t felt only by the enterprise’s security team, and neither is the job of protecting against them. Eliminating vulnerabilities and ultimately the breaches resulting from them is a team effort, requiring collaboration between business teams, IT and..
Your Security Operation Needs Data Science — But It Isn’t That Simple
Given the continuous buzz dinning around data science, it’s easy to imagine it as the panacea to cure almost everything ailing the enterprise. In cybersecurity, specifically, the application of data science can combat alert fatigue, better detect abnormal behavior, and improve security operations..
Cybersecurity Industry Data Protection
Achieving Unity Across Piecemeal Cybersecurity Solutions
Have you inherited a cybersecurity program with many different tools? Do they offer little in the way of measurable outcomes that show your program is more effective today than it was last month?
Why a Carrot Beats a Stick in Cybersecurity Breach Insurance
Just look at the headlines today and it's plain to see: more and more companies of all sizes are getting breached... more frequently and with greater magnitude.
Cybersecurity Budget vs Cross-vector Coverage
Thanks to modern technology, there’s an abundance of tools and services that can help organizations identify and respond to cyberthreats with confidence. Yet, a recent survey from the International Data Group found that almost 80% of senior IT security leaders are concerned that their enterprises..
What Is an Impossible Cybersecurity Trade-Off?
Cybersecurity is an all-over kind of problem. You need to be prepared for anything because attackers can change their strategies on a dime.
The Power of the “X Is a Data Problem” Hypothesis
Over the past two decades, small and medium-sized businesses (SMB) have been flooded with complex, and difficult to process data— ‘big-data’ as it is famously known, moving at terminal speed and with no signs of slowing down.
Predictions vs Process: Why "How" Trumps "What"
We recently released our cybersecurity predictions for 2022. This got me reflecting on whether all the time we allocate toward analyzing adversary trends to generate these predictions is worthwhile. I realized that when compared to other predictive efforts, ours stood unique, in both the approach..
Cybersecurity Industry Managed Detection and Response
log4shell: Patch Necessary, but Insufficient - Proactive Steps Required
December 30th, 2021 Update: Apache released another new version (2.17) after the previous patch was discovered to be vulnerableas well. This article has been updated to reflect the latest recommendations. It remains relevant for those looking to understand what measures beyond patching could be at..
Collaboration is Requisite in Cybersecurity
When I was in the government we used to say cybersecurity is a team sport. Different government agencies have different specialized capabilities. During national cyber incidents, we often needed a broad range of expertise to quickly respond and remediate the intrusion, given the stakes and the high..
Why Automated Response Is Critical in Stopping Threats Before They Spread
Mean Time to X (Detect, Alert, Respond) orMTTX metrics are frequently chosen when people want to determine a response system's ability to respond to an attack. This system will consist of tooling and people.