Why Your Company Can’t Afford to Overlook a Web App Vulnerability Scanner

Vulnerability scanning is something all organizations should be looking into, if they’re not doing it already. Scanning inside and outside the network can help you identify misconfigurations, cyber security gaps or potentially even regulatory shortcomings. The key is to make these scans a habit. After all, just because you’re secure today doesn’t necessarily mean you’ll […]
Rightsizing Your VPN Without Sacrificing Remote Worker Security

Remember back in March, when workplace doors were closed and employees were sent home for a brief shutdown? Some five months later, it’s safe to say the shutdown has been anything but brief. While some organizations have made the move to reopen on a provisional basis, many others have kept their buildings shuttered. There are […]
How to Address Security Compliance Shortfalls Using the CIS Top 20 (Part 3: Organizational Controls)

Cyber security, and by extension security compliance, isn’t just about having the right tools. Nor is it only the concern of dedicated security teams or IT in general. True security and compliance are organization-wide efforts and they tie together proven tools with sound processes and an engaged, vigilant user base. Without all of these different […]
Planning to Roll Out a SIEM? Do These 3 Things First

So, you’ve decided to invest in a SIEM. Maybe you’ve even chosen the one that seems to be the best fit for your organization’s needs. Soon, your security team will be awash in data, with real time insights coming in to one central hub from across your environment. Hackers and any other malicious actors will […]
How to Address Security Compliance Shortfalls Using the CIS Top 20 (Part 2: Foundational Controls)

Security and compliance may not be one and the same, however, the Center for Internet Security (CIS) Top 20 Controls can substantially help organizations achieve both. Strict adherence to CIS’s nearly two dozen cyber security best practices can help organizations ready their defenses for the worst today’s cyber criminals can muster. Additionally, the controls can […]
How to Address Security Compliance Shortfalls Using the CIS Top 20 (Part 1: Basic Controls)

Those in fields such as healthcare and financial services are no strangers to finding ways to live in harmony with data privacy and cyber security regulations. However, with the passage of statutes like GDPR and the California Consumer Privacy Act, those headaches are now being felt more acutely across all industries. What’s more, they’re also […]
Verizon’s Business 2020 Data Breach Investigations Report: 7 Insights for CISOs

Now in its 13th year, the Verizon Business Data Breach Investigations Report has become an annual repository of data points showcasing what’s working (and what isn’t) for cyber criminals and those who oppose them. This time, Verizon’s research team began with a global pool of nearly 160,000 suspected security incidents, distilling them down into the […]
9 Revealing Stats from Cisco’s 2020 CISO Benchmark Study

Looking for some insight into what your peers are doing (and seeing) as they work to keep their own organizations secure? One resource worth checking out is Cisco’s 2020 CISO Benchmark Study. In compiling this incarnation of its yearly tradition, Cisco crowd-sourced the knowledge and experiences of more than 2,800 technology decision-makers from around the […]
Why You Need to Patch Your Windows 10, Server Instances ASAP

Heads up: Microsoft and the National Security Agency (NSA) just sounded the alarm on a newly-discovered Windows vulnerability, one that has left potentially hundreds of millions of devices open to attack. Designated CVE-2020-0601, it affects certificate validation within devices running Windows 10, Windows Server 2016, Windows Server 2019, and Windows Server version 1803. Essentially, attackers […]
5 App Dev Myths Part 4: Custom Development Compromises My Security

There’s a great amount of interest in custom-built applications – and quite a few misconceptions about them as well. Arraya’s Application Development team has encountered many of these, including concerns about complexity, use cases, and more. During this five-part series, our team will seek to dispel some of the more common misunderstandings about custom-built applications […]