Category

Security
Endpoint detection & response (EDR) is a cybersecurity solution consisting of multiple tools (including AI) that monitor for potential security threats and address them head on. This technology works by constantly collecting information from endpoint devices connected to an organization’s network such as desktops, servers, laptops, or tablets. By “information,” we are mostly referring to...
Read More
Keep this in mind as we start the 2022 Windows software patching year: Patching is not enough to keep Microsoft 365 protected. Before you purchase third-party tools that claim to protect you from all threats, or before you begin that zero-trust project, stop for a moment to evaluate whether you are doing all you can...
Read More
Here we go over the steps and preplanning that need to be taken after a cybersecurity incident to get your business back to operational and restore public trust.    Moving into the final stage of the NIST cybersecurity framework, we now enter the “Recover” function. The activities involved in this function would take place after an...
Read More
Following these consumer best practices for online shopping will help you get through the holiday season securely as well as avoid shopping scams, prevent theft of your personal data, and secure your credit card information.   Kate, a mother of three, couldn’t contain her excitement for shopping during the holiday season when she received an email...
Read More
The NIST Security Framework is the ultimate roadmap for which the United States government outlines how businesses can develop their cybersecurity program to account for the threat landscape that is forever evolving. The framework is long and detailed but can be more easily understood when the recommended best practices and security measures are broken down...
Read More
Each year, the U.S. government manages many different departments and agencies to protect its citizens and businesses, including providing military defense, promoting health safety measures, passing consumer protection laws, and enforcing labor laws. That’s just to name a few.  But what about more complex and evolving risks like cybersecurity? Is there any type of resource...
Read More
Thinking of adopting Zero Trust. Here are some fundamental principles you need to know. What is the Zero Trust Security Officially named in 2010, a network security model was introduced to secure organizations’ evolving IT infrastructure, which became more vulnerable after heavily incorporating cloud-based applications and databases into their current IT management strategy, creating a...
Read More
If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy. By Neal Weinberg Interest in zero trust is surging, according to IDG’s 2020 Security Priorities Study, with 40% of survey respondents saying they are actively researching zero trust technologies, up from only 11% in 2019, and 18% of organizations...
Read More
By Christopher Burgess Attackers essentially broke into the Twitch house and cleaned out everything. Following least-privilege access principles and encrypted datasets will help others avoid that scenario. No company wants to see its crown jewels exposed to the elements, yet this is what happened to the Amazon-owned online streaming platform Twitch on October 6 when 125GB...
Read More
Existing and new challenges, from supply chain hacks to 5G rollouts, will continue to test the expanded role of security teams. CISOs faced a number of challenges in 2020, not the least of which was COVID-19 and the mass migration from onsite to remote work. Maybe for the first time, corporate leadership saw just how...
Read More
1 2 3 10