SEARCH JOBS
SCHEDULE A CALL

Security

Home » Security
  • How to Create an IAM Strategy

How to Create an IAM Strategy

How to Create an IAM Strategy It is very common for employees to connect to a company’s network using their own devices. On the positive side, this enables employees to work from anywhere, but these devices are often unsecured. Hackers can easily compromise these devices, steal user identities and passwords, and break into company networks. Ensuring network [...]

2022-02-10T12:44:52-05:00February 10th, 2022|Infrastructure, Security|
  • Security vs Short-Term Profitability

Security vs Short-Term Profitability: Enabling Long-Term Sustainability

Investing in security is expensive, and it’s often tempting to focus first on your current profitability. But not investing in security costs organizations even more. What is the takeaway concerning security vs short-term profitability? If you fail to implement a robust long-term, scalable security infrastructure in your environments from the start, then you run the risk of suffering [...]

2018-12-19T15:34:16-05:00December 19th, 2018|Cloud, Cybersecurity, Security|
  • Questions to Ask During Antivirus PoC

Questions to Ask During Your Next Antivirus PoC

It’s expected that, when you purchase new hardware, the machine will come with antivirus software already installed. But this “complimentary” inclusion has the tendency to lull some end users into a false sense of security, leading them to believe that they don’t need to implement additional protection. Protecting your critical data should go well beyond relying on baseline, [...]

2018-11-16T10:17:21-05:00November 16th, 2018|Security|
  • DEFEATING THE CYBER KILL CHAIN

Defeating the Cyber Kill Chain

What is the Kill Chain? Cyber-attackers executing advanced threats against organizations utilize what’s known as the cyber kill chain. The kill chain is the “high-level framework or workflow that advanced threat actors employ in their efforts to compromise the target,” according to Dell SecureWorks. “Actors behind advanced threats have a toolbox of exploit techniques at their disposal,” says [...]

2016-02-10T11:08:47-05:00February 10th, 2016|Cybersecurity, Security|
  • CISA

Senate Passes Cybersecurity Information Sharing Act: What You Need to Know

The U.S. Senate recently passed the Cybersecurity Information Sharing Act (CISA), a bill that would increase cyberthreat information sharing between the government and the private sector. CISA requires the Director of National Intelligence, the Department of Homeland Security, the Department of Defense and the Department of Justice to develop procedures to promote the timely sharing of classified and [...]

2015-11-18T13:45:56-05:00November 18th, 2015|News & Press, Security|
  • kill chain

Disrupting the Cyber-Attack Kill Chain

Cybercriminals today are utilizing increasingly complex techniques to infiltrate corporate networks—while evading detection—in an effort to steal intellectual property and other sensitive information. Knowing the techniques cyber-attackers use and how to defend against them is paramount to an organization’s success in disrupting the cyber-attack kill chain. The Onslaught of Malware Attackers are constantly bombarding networks with malware in [...]

2015-11-09T13:42:11-05:00November 9th, 2015|Cybersecurity, Security|
  • Cyberthreats

CFOs, CIOs Teaming Up to Combat Cyberthreats

Why CFOs and CIOs Should Work Together Global advisory services firm Ernst & Young recently issued a report on the growing collaboration between chief financial officers and chief information officers when it comes to handling cyberthreats. According to the report, titled “Partnering for Performance,” 66 percent of CFOs make cybersecurity a high or very high priority; and 35 [...]

2015-08-27T13:25:13-04:00August 27th, 2015|Cybersecurity, Security|
  • Real-Time Threat Protection

Gigamon, FireEye Deliver Real-Time Threat Protection

Last month, Gigamon, a network visibility, analytics and security firm, announced that its GigaSECURE Security Delivery Platform fully supports and interoperates with network security vendor FireEye’s advanced persistent threat solutions to deliver real-time threat protection. The resulting cybersecurity dream team ensures that FireEye solutions receive the necessary traffic that they need when responding to advanced cyberthreats, while the [...]

2015-08-25T13:21:19-04:00August 25th, 2015|Security|
  • APT Threats

It’s Time to Address the APT Threat

What are APTs? Organizations are increasingly facing targeted cyber-attacks against their systems, known as advanced persistent threats. APT threats can result in the disclosure of sensitive data such as credit card numbers and patient health information. APTs, according to security vendor Trend Micro, are “purpose-built to breach your network and steal your data, intellectual property, and communications without [...]

2015-07-15T12:07:32-04:00July 15th, 2015|Security|
  • venom

VENOM Bug Highlights Risks to Company Data

The recent discovery of the security vulnerability known as VENOM once again highlights the risks organizations face when it comes to protecting their sensitive information. What is VEMON? VENOM, discovered by Jason Geffner of CrowdStrike, an endpoint security provider, can expose access to corporate intellectual property and sensitive and personally identifiable information, “potentially impacting the thousands of organizations [...]

2015-06-12T11:51:05-04:00June 12th, 2015|Security|
Go to Top