Latest Insights
All Topics
- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Data Protection
- Threat Intelligence
- Regulatory Compliance
- Security Takes a Village
- Cybersecurity News
- Education
- C-Suite Accountability
- Security Hygiene
- Endpoint Detection and Response
- Ransomware
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
Data Protection
Regulatory Compliance
Was My Data Really Stolen?
Here’s a hypothetical: Today, you were informed of a cyber incident. Luckily, it appears minor and that no data was exfiltrated. After your brief panic subsides, you figure “Great! I’m all in the clear.” In the words of the great Lee Corso, “Not so fast, my friend.” When you are the steward of..
Operational Risk Reduction
Managed Detection and Response
Supplier Hacked? Next Steps to Take
It's not a call you want to get. One of your suppliers is in touch to let you know they have been victimized by a cyber-attack. Whether it was ransomware or a phishing scheme or just a malicious file that someone clicked on, you immediately start thinking about the ramifications for your business...
Data Protection
How Understanding Cybersecurity Threats Influences Your Defenses
There are the threats you know of. Then, there are the threats you should actually be defending against.
Data Protection
Evaluating Paths to Incident Response
If you're reading this, chances are you’re actively trying to improve your security to prevent a breach, or you're experiencing a breach right now and trying to determine what to do about it. Most of the advice you've found so far probably has you writing an incident response (IR) plan and then..
Operational Risk Reduction
Why You Need a Software Restriction Policy (Right Now)
Windows Group Policy tends to get overlooked by most Administrators. Typically, you visit this policy when you first set up a domain—which for many companies is well beyond the first day you start using Windows. By the time you get around to re-visiting Windows Group Policy, most of the..
Managed Detection and Response
Asking the Right Questions About Cyber Insurance
One of the ways business stakeholders attempt to transfer risk (not to be confused with risk mitigation), is by buying cybersecurity breach insurance. Most of our clients have it—some because they want it, others because they're required to carry it by regulation.
Regulatory Compliance
CCPA: No Extensions, No Excuses
California’s Consumer Privacy Act (CCPA) came into effect on the first of January 2020, and while we haven’t seen any CCPA penalties handed out yet, I’m betting one is coming any day now. Given provocative comments from California’s Attorney General, companies recognize they must get compliant in a..
Managed Detection and Response
IntelliGO Acquired by ActZero
It’s not often we get to make an announcement quite this exciting: IntelliGO Networks has been acquired by ActZero, a Palo Alto-based artificial intelligence company! You can check out the press release here.
Cybersecurity Industry
Managed Detection and Response
The Perfect Phishing Email
Thinking like the bad guys is part of being in cybersecurity. Our ability to anticipate the moves of our opponents is essential, just like in a chess game - except with real business consequences. Drawing on my prediction of worse spam to come in 2020, I had been thinking about the “perfect”..
Cybersecurity Industry
Managed Detection and Response
2020 Cybersecurity Predictions
Foresight is a powerful human capability – and one that is integral in the field of cybersecurity. Today I revisit the predictions I made a year ago about what we could expect to see in this industry in terms of breaches, malware, regulations, and technological developments. I examine whether these..
Cybersecurity Industry
Managed Detection and Response
Why Your AV Won't Stop Ryuk Ransomware
I have been blogging about ransomware for a long time now, given its devastating impact upon small to mid-sized enterprises. However, there have been some indicators lately that people are finally being forced to pay attention to. For instance, the FBI issued a warning regarding ransomware last..
Assess Outcomes (Not Features)
Managed Detection and Response
Assessing Business Outcomes of Cybersecurity
We examine the specific outcomes that cybersecurity solutions should be driving for your small to mid-sized enterprise. This should help you to assess your existing cybersecurity solutions, determine the impact of potential solutions, and ultimately highlight the value and necessity of..
Cybersecurity Industry
Cybersecurity KPIs for the SMB
When I talk about security for the SMB, the go-to barrier is insufficient resources to invest in security. While I’m not denying that limited resources for a smaller organization can constrain your options when it comes to building your own security solution, having KPIs to measure the risk you are..
Managed Detection and Response
Building a SOC Without Even Knowing It
This is for all those who say “I’m way too small to be building a Security Operations Center (SOC) – all I need right now is a ” … because whether you know it or not, you are embarking on the lengthy, complex, and expensive path of building a SOC,..
C-Suite Accountability
Do SMBs Need a CISO?
As part of our “C-Suite Accountability” theme, we explore why holding senior executives accountable is a necessary motivator in the prioritization, development, and adoption of cybersecurity initiatives across the small to medium-sized organization. In this post, our own Virtual CISO discusses the..