Cybersecurity vs Information Security

Cybersecurity vs Information Security

It is easy to become lost in a sea of terms when it comes to protecting your company’s data. A particularly relevant case in point is cybersecurity vs information security. Although they sound similar, there are definitely factors that set these two apart from each...
Cost of Data Breach

Cost of Data Breach

No two words inspire a deeper feeling of dread in CEOs and CFOs than “data breach.” Most executives are queasily familiar with the glaring news headlines detailing the catastrophic consequences that corporations such as Target, Home Depot, Neiman Marcus and even the...
What is a Cyber Security Posture

What is a Cyber Security Posture

Blog  What is a Cyber Security Posture What is a Cyber Security Posture Security is not simply a firewall or set of user authentication policies that cover small parts of your organization. In fact, you should think of your cyber security posture as a complete whole...
Man-in-the-middle Attacks

Man-in-the-middle Attacks

Many threats lurk right outside your network just waiting to exploit even the tiniest weakness or vulnerability. Of all of them, the man in the middle attack (mitm) is one of the worst. Just what is man in the middle attack, and what steps can you take to prevent it...
Cybersecurity Audit Services

Cybersecurity Audit Services

Blog  Cybersecurity Audit Services Cybersecurity Audit Services No longer is a cyber attack a rare phenomenon. Nowadays, there is a good chance that one will affect your company. In recent years, protecting the security of your digital perimeter has become a necessity...
How to Build an Incident Response Team

How to Build an Incident Response Team

Blog  How to Build an Incident Response Team How to Build an Incident Response Team Since safeguarding the integrity of your network and other systems is of paramount importance to companies of all sizes, you have most likely implemented measures such as firewall...
The FUD Factor

The FUD Factor

Recently I had the opportunity to lead a panel at the Global CISO Forum in Atlanta, GA. Our panel topic was a discussion on how to avoid FUD in selling security. FUD is an acronym for Fear, Uncertainty and Doubt. The topic focused on CISO’s “selling” security to the...