Latest Insights
All Topics
- All Topics
- Cybersecurity Industry
- Managed Detection and Response
- Data Protection
- Threat Intelligence
- Regulatory Compliance
- Security Takes a Village
- C-Suite Accountability
- Cybersecurity News
- Endpoint Detection and Response
- Ransomware
- Security Hygiene
- Assess Outcomes (Not Features)
- Operational Risk Reduction
- Virtual CISO
- Success Stories
Cybersecurity Industry
Managed Detection and Response
The Perfect Phishing Email
Thinking like the bad guys is part of being in cybersecurity. Our ability to anticipate the moves of our opponents is essential, just like in a chess game - except with real business consequences. Drawing on my prediction of worse spam to come in 2020, I had been thinking about the “perfect”..
Cybersecurity Industry
Managed Detection and Response
2020 Cybersecurity Predictions
Foresight is a powerful human capability – and one that is integral in the field of cybersecurity. Today I revisit the predictions I made a year ago about what we could expect to see in this industry in terms of breaches, malware, regulations, and technological developments. I examine whether these..
Cybersecurity Industry
Managed Detection and Response
Why Your AV Won't Stop Ryuk Ransomware
I have been blogging about ransomware for a long time now, given its devastating impact upon small to mid-sized enterprises. However, there have been some indicators lately that people are finally being forced to pay attention to. For instance, the FBI issued a warning regarding ransomware last..
Assess Outcomes (Not Features)
Managed Detection and Response
Assessing Business Outcomes of Cybersecurity
We examine the specific outcomes that cybersecurity solutions should be driving for your small to mid-sized enterprise. This should help you to assess your existing cybersecurity solutions, determine the impact of potential solutions, and ultimately highlight the value and necessity of..
Cybersecurity Industry
Cybersecurity KPIs for the SMB
When I talk about security for the SMB, the go-to barrier is insufficient resources to invest in security. While I’m not denying that limited resources for a smaller organization can constrain your options when it comes to building your own security solution, having KPIs to measure the risk you are..
Managed Detection and Response
Building a SOC Without Even Knowing It
This is for all those who say “I’m way too small to be building a Security Operations Center (SOC) – all I need right now is a ” … because whether you know it or not, you are embarking on the lengthy, complex, and expensive path of building a SOC,..
C-Suite Accountability
Do SMBs Need a CISO?
As part of our “C-Suite Accountability” theme, we explore why holding senior executives accountable is a necessary motivator in the prioritization, development, and adoption of cybersecurity initiatives across the small to medium-sized organization. In this post, our own Virtual CISO discusses the..
C-Suite Accountability
Cybersecurity Knowledge Gap: No Longer An Excuse
As the rate of cybersecurity breaches continues to increase, especially against mid-market organizations, companies are beginning to recognize that an important part of mitigating the risk of breaches is continued user education. Unfortunately, internal stakeholders (and even some vendors) believe..
C-Suite Accountability
Why Every Leadership Meeting Should Include a Cybersecurity Update
As part of our “C-Suite Accountability” theme, we explore why holding senior executives accountable is a necessary motivator in the prioritization, development, and adoption of cybersecurity initiatives across the small to medium-sized organization. In this post, we cover the importance of..
C-Suite Accountability
Worst (and Best) Cybersecurity Questions Ever
As part of our “C-Suite Accountability” theme, we explore why holding senior executives accountable is a necessary motivator in the prioritization, development, and adoption of cybersecurity initiatives across the small to medium-sized organization. In this post, Adam Mansour provides the best and..
Security Takes a Village
How Operations Protects Your Business
As part of our “security takes a village” focus, we are exploring how stakeholders other than dedicated cybersecurity or IT team can help keep your organization secure. In this post, our Head of Operations, Jennifer Mitchell, offers a round-up of how Ops leaders (and their teams) can help secure..
Security Takes a Village
The Role of IT in Protecting Your Business
As part of our “Security Takes a Village” theme, we’re examining the roles of stakeholders other than a dedicated security team in securing your business. In this post, Perry Kuhnen offers a view of what IT’s role should be in securing your business. He presents a hard delineation of the..
Security Takes a Village
Cybersecurity Skills Shortage: A Hiring Manager’s Perspective
As part of our “security takes a village” focus, we are exploring how stakeholders other than a dedicated cybersecurity or IT team can help keep your organization secure. In this post, Alyssa Miller, ActZero Networks’ Human Resources Manager, discusses a cybersecurity consideration with..
Cybersecurity Industry
Managed Detection and Response
Turning the Tables on Hackers with MDR
With the number of cyber breaches you hear about in the news, it’s easy to get disheartened and frightened. Rightfully so! I, however, remain optimistic, and here’s why: with the advent of the change in strategy the industry is taking, the playing field is being leveled in favor of the good guys...
Managed Detection and Response
8 Steps to Take After Getting Hacked
Let’s run through a scenario.