Managed Security

Expert articles
NIST CSF 2.0: What’s New

NIST CSF 2.0: What’s New

Blog  Established in 2014, the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) is a vital tool in the...

read more
Red vs. Blue Team Security

Red vs. Blue Team Security

Blog  Hackers and other cybercriminals are pulling out all the stops, mounting a stunning array of increasingly sophisticated attacks on...

read more
SOC for Cybersecurity

SOC for Cybersecurity

Blog  Managing customer data and exchanging digital information on a global level provides your organization with both unparalleled...

read more
Compliance vs Security

Compliance vs Security

An organization must constantly be on guard against external network attacks, threats from its own staff and third-party vendors and even fatal...

read more
Cyber Threat Hunting

Cyber Threat Hunting

Your company’s network is a complex environment managed by many moving parts. That makes detecting intruders a constant challenge. The truth is that...

read more
Data Security Strategy

Data Security Strategy

When you are on the front lines charged with the critical duty of ensuring that your company’s information and systems are as protected as possible...

read more
AWS Penetration Testing

AWS Penetration Testing

Blog  Amazon Web Services (AWS) platform supports a wide variety of business activities that include data storage, web application...

read more
Information Security Program

Information Security Program

Any management or human resource professional knows that standards and practices can never be truly implemented and enforced unless and until they...

read more

Security Maturity Model

There are two complementary objectives of any cybersecurity operation. Tools both automated and human must be in place to monitor network systems,...

read more
Azure Penetration Testing

Azure Penetration Testing

Blog  Are you worried about the safety of your data in the cloud? Azure penetration testing is vital to securing apps on this giant...

read more
What is an MSSP

What is an MSSP

Blog  One of the most daunting challenges facing today’s businesses is protecting the security of the data they possess. For many,...

read more
IT Cost Reduction Strategies

IT Cost Reduction Strategies

Few modern businesses would be able to function without information technology. While eliminating it is neither practical nor desirable, there are...

read more

Insider Threats

When you think about your company’s digital protection strategy, the first threats that come to mind might involve those stemming from external...

read more
Cybersecurity Risk Analysis

Cybersecurity Risk Analysis

Blog  Keeping up with cybersecurity is more crucial than ever in the modern digital environment. Businesses must take preventative measures...

read more

Cybersecurity Strategy

In today’s business world, the innovations of bad actors are constantly evolving as they devise new ways to breach defenses, and the potential for...

read more
Cost of Data Breach

Cost of Data Breach

No two words inspire a deeper feeling of dread in CEOs and CFOs than “data breach.” Most executives are queasily familiar with the glaring news...

read more
Man-in-the-middle Attacks

Man-in-the-middle Attacks

Many threats lurk right outside your network just waiting to exploit even the tiniest weakness or vulnerability. Of all of them, the man in the...

read more
The FUD Factor

The FUD Factor

Recently I had the opportunity to lead a panel at the Global CISO Forum in Atlanta, GA. Our panel topic was a discussion on how to avoid FUD in...

read more