Managed Security

Expert articles
SOC for Cybersecurity

SOC for Cybersecurity

Blog  Managing customer data and exchanging digital information on a global level provides your organization with both unparalleled...

read more
Compliance vs Security

Compliance vs Security

An organization must constantly be on guard against external network attacks, threats from its own staff and third-party vendors and even fatal...

read more
Cyber Threat Hunting

Cyber Threat Hunting

Your company’s network is a complex environment managed by many moving parts. That makes detecting intruders a constant challenge. The truth is that...

read more
Data Security Strategy

Data Security Strategy

When you are on the front lines charged with the critical duty of ensuring that your company’s information and systems are as protected as possible...

read more
AWS Penetration Testing

AWS Penetration Testing

Blog  Amazon Web Services (AWS) platform supports a wide variety of business activities that include data storage, web application...

read more

Security Maturity Model

There are two complementary objectives of any cybersecurity operation. Tools both automated and human must be in place to monitor network systems,...

read more
What is an MSSP

What is an MSSP

Blog  One of the most daunting challenges facing today’s businesses is protecting the security of the data they possess. For many,...

read more

Insider Threats

When you think about your company’s digital protection strategy, the first threats that come to mind might involve those stemming from external...

read more
TTP Cyber Security

TTP Cyber Security

Blog  The methods and strategies that criminals use when planning and executing an attack on a company's network and the data it stores are...

read more

Cybersecurity Strategy

In today’s business world, the innovations of bad actors are constantly evolving as they devise new ways to breach defenses, and the potential for...

read more
Cost of Data Breach

Cost of Data Breach

No two words inspire a deeper feeling of dread in CEOs and CFOs than “data breach.” Most executives are queasily familiar with the glaring news...

read more
Man-in-the-middle Attacks

Man-in-the-middle Attacks

Many threats lurk right outside your network just waiting to exploit even the tiniest weakness or vulnerability. Of all of them, the man in the...

read more
The FUD Factor

The FUD Factor

Recently I had the opportunity to lead a panel at the Global CISO Forum in Atlanta, GA. Our panel topic was a discussion on how to avoid FUD in...

read more