The SOC Dilemma: Build, Buy or In Between?

IT security teams have a very difficult job, with an ever-changing threat landscape and the fact that a cyberattack only has to succeed once for an organization to be negatively affected. At the same time, most organizations are strapped for resources, especially when it comes to training and keeping experienced in-house security staff. A recent […]

Healthcare organizations and the cloud: Benefits, risks, and security best practices

cloud icon over tablet

Healthcare organizations are moving their business-critical applications and workloads to the cloud, and while there are many benefits (lower costs, added flexibility and greater scalability), there are also inherent risks that cannot be overlooked. Ensuring organizations’ sensitive data is being monitored and protected (24/7) is key and having analysts who clearly understand security in the cloud is […]

SIEM challenges: Why your security team isn’t receiving valuable insights

Today, many enterprises use security information and event management (SIEM) software to help detect suspicious activity on their networks. However, to be effective organizations need to surround a SIEM with security experts, advanced use cases, threat intelligence, and proven processes to investigate and respond to threats. Misperceptions: Why not set and forget? Since a SIEM […]

When is it Time to Break Up with your #CyberSecurity Services Provider?

A cybersecurity services provider should be a trusted business partner and act as true extension of an enterprise’s in-house security team. However, sometimes organizations are left feeling dissatisfied with the relationship they’ve forged with the services provider they’ve selected. There are several reasons the relationship may not be working out, and therefore it may be […]

What Your Business Needs to Know About How to Comply With the GDPR

Data security is a global problem that crosses all international borders, time zones and currencies. Cyber criminals based in one part of the world can freely target companies or individuals across the globe in a matter of seconds. Therefore, your organization’s cybersecurity posture must be agile and able to monitor, detect and respond to incoming […]

Extortion-based cyber attacks: The next evolution in profit-motivated attack strategies

Ransomware banner

Today, data breaches have impacted just about every industry possible. From entertainment to the restaurant industry, no sector or organization appears to be safe, and it has been predicted that cyberattacks are going to get even worse. Adding chaos to the mix Recent high-profile ransomware attacks, such as WannaCry and NotPetya, demonstrated the continued global expansion of high-stakes […]

MDR or EDR. What’s right for you?

Targeted attacks are on the rise and often go undetected by traditional security solutions and methods. Endpoint Detection and Response (EDR) companies like CrowdStrike, Carbon Black, CounterTack, and a new up and coming company ZitoVault, have solutions that can stop targeted attacks in their tracks. Why EDR? Customized malware can bypass traditional antivirus solutions, so […]

Strategic Relationships Help Australian Businesses Stay Compliant & Secure

The Australian Federal Government has passed The Privacy Amendment (Notifiable Data Breaches) Bill 2017, which will go into affect on February 23, 2018. This amendment will require organizations with an annual turnover of $3 million who suffer a data breach to report it to the Privacy Commissioner. They must also notify each individual to whom […]

What Companies Can Learn from the SEC Breach

Another day and unfortunately, another high-profile cybersecurity hack is in the news. This time, it happened at the Securities and Exchange Commission (SEC). On September 20, SEC officials said the agency, which regulates the United States markets and protects investors, had a security breach in 2016 that affected the electronic storing system which houses public-company […]

2017 Security Threats for Healthcare

From the Bon Secours Health System data breach impacting nearly 700,000 individuals to the $17,000 in ransom that Hollywood Presbyterian Medical Center paid hackers, 2016 wasn’t the best year for healthcare security. So what’s in store for 2017? The healthcare industry is always going to be a target for hackers, yet security continues to be a challenge due […]

New Poll: Most Organizations Struggle With Cybersecurity

Colorful keyboard keys

A recent IDC poll revealed the uneasy state of cybersecurity today, and the results should be of interest to security professionals from all practices. The poll found that nearly half (47%) of surveyed organizations, in both the U.S. and Europe, are not gathering enough information about cyber-incidents to provide adequate defensive measures. This is a […]

Winners and Losers from WannaCry

Prevention remains the goal, but detection and response capabilities are equally important. How did your cybersecurity services provider measure up? Preventing the next big ransomware cyberattack is on everyone’s minds since WannaCry burst onto the scene on May 12, 2017.  But preventing isn’t the only thing CISOs should be focused on. Monitoring and responding to […]