Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Executive's Guide to Managing Cyber Risk

With the enterprise so dependent on technology and digitized assets, how can it prevent data-related disasters from sinking the business? The answer is by taking a new approach to managing cyber risk as a function of business risk at large. McKinsey calls this "Digital Resilience", but it can simply be thought of as conducting business safely in today's connected environments.

How long is your dwell time?

If many of the recent threat reports are to be believed, we can assume that, on the whole, businesses are not improving when it comes to detecting a network breach. In those isolated cases where improvement can be seen, the improvement is small. The Mandiant M-Trends 2018 report states that the median global dwell time sat at 101 days (in 2017). I can believe that.

Considering Architecture When Building a SOC

SOC architecture is a vital component to consider when building an effective and reliable SOC. It includes the consideration of SOC locations and centralization, SOC architecture and organizational size, SOC staffing, and SOC mixing up with a cloud. The subsequent sections delve into these essential points in great details.

3 Steps to Spotting Insider Threats

Organizations focused on security threats tend to focus on the external attacker. Solutions used to secure the perimeter, endpoints, email, and data are put in place. While absolutely necessary, they organizations lack the ability to equally protect against the insider - the employee that puts the organization at risk through either malicious intent or negligence.

Making Continuous HIPAA Compliance Easy with ExpertOps

Healthcare organizations continue to face relentless cyberattacks owing to the immense value placed on patient health information on the dark web. Patient records have almost everything the attacker needs to carry out sophisticated insurance fraud schemes, purchase medical supplies or drugs, or commit other types of fraud including outright identity theft.