Search Results for: security posture Blog Post How to improve your organization’s security posture February 17, 2020 For an organization, any electronic or physical information is an asset and its security is exceptionally crucial. Information security is... Blog Post Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It... Page The Daily TRUTH – Temporary Remote Universal Threat Hunt March 12, 2020 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult... Page Short – Term Incident Response and Digital Forensics Retainer March 22, 2020 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult... Blog Post Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... Blog Post Cyberattack Targets U.S. Health Agency During the Outbreak of COVID-19 March 18, 2020 The computer system of the US Department of Health and Human Services (HHS) came under cyberattack last Saturday. Some people... Blog Post Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... Blog Post Mobile Industry, Banks, and NCSC Collaborate To Stop Smishing April 28, 2020 Smishing, also known as text messaging scams, is a measure scammers use to trick people and make them share passwords... Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that... Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Blog Post Emails From “WHO” Plant Keyloggers on Your PC March 25, 2020 With the outbreak of coronavirus, emails claiming to be from the leader of the World Health Organization (WHO) are trying... Blog Post How to improve your organization’s security posture March 29, 2017 Made up of both technical and non-technical policies and procedures, a security posture is your organization’s overall security plan or... Blog Post What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to... Blog Post Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security...
Blog Post How to improve your organization’s security posture February 17, 2020 For an organization, any electronic or physical information is an asset and its security is exceptionally crucial. Information security is...
Blog Post Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It...
Page The Daily TRUTH – Temporary Remote Universal Threat Hunt March 12, 2020 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult...
Page Short – Term Incident Response and Digital Forensics Retainer March 22, 2020 Phishing is the main ingredient of most cyberattacks and successful data breaches. Human factor is still among the most difficult...
Blog Post Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
Blog Post Cyberattack Targets U.S. Health Agency During the Outbreak of COVID-19 March 18, 2020 The computer system of the US Department of Health and Human Services (HHS) came under cyberattack last Saturday. Some people...
Blog Post Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions...
Blog Post Mobile Industry, Banks, and NCSC Collaborate To Stop Smishing April 28, 2020 Smishing, also known as text messaging scams, is a measure scammers use to trick people and make them share passwords...
Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that...
Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
Blog Post Emails From “WHO” Plant Keyloggers on Your PC March 25, 2020 With the outbreak of coronavirus, emails claiming to be from the leader of the World Health Organization (WHO) are trying...
Blog Post How to improve your organization’s security posture March 29, 2017 Made up of both technical and non-technical policies and procedures, a security posture is your organization’s overall security plan or...
Blog Post What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security...
Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to...
Blog Post Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security...