Choosing the Right Security Services Provider
Managed Security Services – the Next Frontier Several weeks ago we wrote a blog post titled, “A Look at 2023’s Top 5 Cyber Risks – and Strategies for Defending Against Them;” we discussed the following Cyber Risk issues: Strategy 1: Build Your
A Look at 2023’s Top 5 Cyber Risks – and Strategies for Defending Against Them
Last month we wrote a blog post titled “Top 5 Cybersecurity Trends to Watch in 2023,” which discussed the following five trends: Trend 1: Threat Actors Are Preying on People’s Emotional State Trend 2: Exponential Ransomware: The Rise of Double
Building a Next-Generation Security Operations Center
Building an enterprise Security Operations Center (SOC) calls for careful planning and the precise coordination of people, processes, and technologies, as we covered in our previous post, 7 Steps to Building a Security Operations Center. However, once you’ve established a solid
7 Steps to Building a Security Operations Center
Reviewing cybercrime statistics for the year is always a sobering exercise, and 2022 is no exception. Threat actors continue to up the ante, and data breaches grew significantly in Q3 2022, surging by 70% quarter-over-quarter. Looking ahead to 2023, experts predict that
Top 5 Cybersecurity Trends to Watch in 2023
There’s an oft-quoted ancient Chinese proverb that says: “May you live in interesting times.” It seems to resonate with our current situation: geopolitical upheaval, a pandemic recovery, a recessionary climate, and intensifying, ever-more sophisticated acts of cybercrime. If cybercrime were measured
Nine Out of Ten Organizations Fail to Address Security Risks
Foundry, Formally IDG Survey Points to a Major Shift in Cybersecurity Spending While CEOs and CFOs develop forward-thinking strategies around new markets, products, and services to attract new customers, CISOs and CIOs continue to adjust their cybersecurity strategies. Changes to organizational processes
Two-Thirds of Organizations Were Hit by a Ransomware Attack Last Year
In SpyCloud’s Ransomware Defense Report, its annual survey of CISOs or Chief Information Security Officers and heads of IT security from Canada, the UK, and US they found that that security teams are starting to lose hope that they can
How CASB Solutions are Improving Cloud Security
Cloud access security brokers (CASBs) are on-premises, or cloud-based security policy enforcement points, typically placed between cloud service consumers and their cloud service providers (CSB). The solutions often combine and add enterprise security policies when cloud-based resources are accessed. Further,
Malware: Old Tools; New Tricks
Since the earliest form of a computer virus was created in 1949, malware has certainly come of age. Malware continues to wreak havoc on corporate and government entities and remains a perpetual thorn in the side of vendors and IT
How Does the Cyber Mercenary Business Work?
The Cyber Mercenary Business is Surging, Unfortunately Reuters wrote a report on the booming business of Cyber mercenaries which we found particularly interesting and thought it was well worth sharing. The report discusses in detail, various cyber mercenary hacks which have