Taking a Risk-Based Approach to Patch Management
Designing and Implementing a Risk-Based Patch Management Program In this blog post, we wanted to take an additional step into explaining the benefits of quality vulnerability management, vulnerability assessments and patch
The 5 Steps to Building a Zero Trust Network
The 5 Basic Steps to Building a Zero Trust Network Zero Trust is a network security model, based on a strict identity verification process. The framework dictates that only authenticated and
Security Leaders Grapple with Understanding Their Own Cybersecurity Risk – Part 2
Risk Management Comes Back into Focus – Part 2 In our last blog post, Security Leaders Grapple with Understanding Their Own Cybersecurity Risk – Part 1 we quoted a recent Forrester
Security Leaders Grapple with Understanding Their Own Cybersecurity Risk – Part 1
Risk Management Comes Back into Focus Less than 50% of IT Security leaders are able to measure or quantitatively understand their organization’s level of risk. According to a study published by
ZeroLogon Illustrates the Importance of Vulnerability Management
ZeroLogon and the Importance of Vulnerability Management In this blog, we have written about regular security hygiene including executing regular vulnerability assessments and implementing a viable vulnerability management program. However, many
What You Need to Know About Vulnerability Assessments
How Vulnerability Assessments Differ Across Providers In our Vulnerability Management – A Best Practice blog post, we suggested vulnerability assessments were the process of scanning for and identifying possible vulnerabilities and
Why Organizations Are Moving to Managed Firewall and SIEM Solutions
Overcoming the Challenges of Firewall and SIEM Management This blog post is not a commercial for SecureOps; we have just worked with enough clients to know that tuning firewalls and managing
The REAL Benefits of a Managed Security Service Provider (MSSP)
The Advantages of Outsourcing Cybersecurity We’ve written blog posts on the “5 Benefits of an MSSP” and we had a two-part series on “Increasing SOC Effectiveness. However, MSSP’s are evolving quickly
INTERPOL – Cybercrime Increasing at “Alarming Pace”
The State of Cybersecurity in 2020 This blog post is geared to provide a clear picture of the State of Cybersecurity in 2020 according to leading research groups and cybersecurity authorities.
Four Strategic Principles of Network Security Design
We recently looked at the CIS 20 – a list of 20 key controls that you should implement within your organization to maintain comprehensive cybersecurity. A recurring element in these