Posts about CyberSecurity

Benefits of a virtual CISO over a full-time CISO

Benefits of a virtual CISO over hiring a full-time CISO It doesn't take much these days to realize cyber security is a big topic. We can hardly go a week without hearing about a cyberattack on the latest high-profile target. Facebook, Adobo, Panera and Sony are some recent companies that had some big, high-profile breaches. Companies with lots of users, servers or sensitive data need to evaluate their risk position when it comes to cybersecurity. This quickly becomes a conversation about whether to hire a Chief Information Security Officer, CISO. There are a lot of companies out there with [...]

Why a Managed SOC Saves Critical Time and Money

Companies of all sizes are catching on that they need to pay more attention to security. When they realize they need to invest, the concept of a Security Operation Center (SOC) will soon come up. Companies can put in their own SOCs or work with a third party with a Managed SOC. This article explains some benefits of a managed SOC. You Need to Separate your NOC from your SOC Many companies do not have an independent Security Operation Center (SOC). A common theme is they have the network engineers do additional task. Some companies can get away with [...]

Cybersecurity Certificates to Boost Your Earnings

Cybersecurity is a hot topic for every CIO and CTO today. Every day new cyber incidents are reported. In 2018, Sears, Best Buy, Facebook and Panera Bread all reported cyber-attacks and incidents. This has increased the demand of professionals who can help the organizations secure their systems. So, if you have some really good cybersecurity certificates on your IT resume, you can present yourself as an ideal candidate. Such certifications open a tremendous window of opportunity for you to explore. Cybersecurity certificates are an excellent way to boost your earnings. With these certificates, you can increase your competence and [...]

Technology Spotlight: Vulnerability Management and Penetration Testing

Vulnerability management (Blue Team), Penetration testing (Red Team) are like two sides of a coin, one without the other is incomplete. News Flash: When it comes to security, incomplete equals "at risk". We see this duality in every industry where assurance is required.  Such as in industrial design and testing. In the cyber world management must begin with assessing what the potential for damage to brand integrity will be should a breach occur. Loss of customer or public confidence? Loss of trade secrets? Leakage of Personally Identifiable Information? Once management embraces the danger a breach represents to their business, [...]

What Happens During a Cybersecurity Assessment?

When most people think of cybersecurity, they think of anti-virus and firewalls. While that is part of cybersecurity, it is equivalent to thinking of a tire or a windshield when thinking about an automobile. Cybersecurity is the comprehensive ability of an organization to identify, protect, detect, respond and recover from cyberincidents. These cyberincidents have the potential to damage brand integrity through data loss or leakage. Cybersecurity assessments are an important compoent to any greater cybersecurity strategy. This article discusses what happens in a cybersecurity asessment. A Cybersecurity Posture Assessment is standardized process used to define, evaluate, assess and document [...]