Addressing the Cyber Security Talent Shortage

There will always be uncertainty. The world continues to deal with the pandemic, global conflict, a potential recession, and more. Growing cyber threats stem from these issues and seem to be the only thing we can be certain of. With this, the demand for cyber security practices, solutions, and talent follows. It’s very likely that […]
#StopRansomware with a Ransomware Readiness Assessment

On December 12, 2022, the FBI and CISA released a joint Cybersecurity Advisory (CSA) as part of their ongoing #StopRansomware campaign efforts. This joint advisory highlights the dangers of Cuba ransomware, a group of malicious actors who have reportedly acquired over $60 million in ransoms and have affected more than 100 victims. Note, that this […]
Planning a SIEM Migration? Here are 4 Tools to Consider

In recent years, the conversation around security has shifted. As cybercrime has reached an all-time high, organizations have to be ready to identify and react to threats before they can cause disruption. Security Information and Event Management (SIEM) is a security solution that will log data from security-related events, identify abnormalities, and generate alerts when […]
Ransomware isn’t Going Away - Make it Less of a Threat with Dell EMC PowerProtect Cyber Recovery

If there’s one technology topic most of us probably would have liked to leave back in 2020, it’s ransomware. Given how lucrative the technology has become, it’s doubtful cyber criminals will be open to the idea of letting it fade from headlines anytime soon. Whether they’re able to keep up last year’s pace, in which […]
Sunburst/Solorigate Aftermath: 4 Lessons Learned from the SolarWinds Breach

Organizations everywhere are only just beginning to come to terms with the Sunburst/Solorigate compromise. Even at this stage, it’s clear the backdoor into SolarWinds’ Orion network monitoring and management platform represents one of the most substantial cyber security breaches in recent memory. SolarWinds’ client list reads like a who’s who of the public and private […]
2 Ways Attackers Have Tweaked Ransomware to Make it Even More Effective

The ransomware playbook used to be fairly straightforward. Attackers would gain access to an organization’s data, lock it down, make their demands, and then wait to see if the bitcoin would roll in. And roll in it did. Ransomware has become a multi-billion dollar industry, one with an alarmingly low barrier to entry thanks to […]
Planning to Roll Out a SIEM? Do These 3 Things First

So, you’ve decided to invest in a SIEM. Maybe you’ve even chosen the one that seems to be the best fit for your organization’s needs. Soon, your security team will be awash in data, with real time insights coming in to one central hub from across your environment. Hackers and any other malicious actors will […]
How to Address Security Compliance Shortfalls Using the CIS Top 20 (Part 2: Foundational Controls)

Security and compliance may not be one and the same, however, the Center for Internet Security (CIS) Top 20 Controls can substantially help organizations achieve both. Strict adherence to CIS’s nearly two dozen cyber security best practices can help organizations ready their defenses for the worst today’s cyber criminals can muster. Additionally, the controls can […]
How to Address Security Compliance Shortfalls Using the CIS Top 20 (Part 1: Basic Controls)

Those in fields such as healthcare and financial services are no strangers to finding ways to live in harmony with data privacy and cyber security regulations. However, with the passage of statutes like GDPR and the California Consumer Privacy Act, those headaches are now being felt more acutely across all industries. What’s more, they’re also […]
Verizon’s Business 2020 Data Breach Investigations Report: 7 Insights for CISOs

Now in its 13th year, the Verizon Business Data Breach Investigations Report has become an annual repository of data points showcasing what’s working (and what isn’t) for cyber criminals and those who oppose them. This time, Verizon’s research team began with a global pool of nearly 160,000 suspected security incidents, distilling them down into the […]