Infocyte Q2 2020 Newsletter

The New Work Environment In the past, to contain a security incident, your team had to be present at the devices. This requirement has been becoming less obtainable for quite some time with more employees working remotely. Now, with COVID-19 being decl… Continue reading Infocyte Q2 2020 Newsletter

The Bedrock of Security

Many organizations struggle with insecure access methods and unidentified processes. Integrating new, updated resources and technology can be an increasingly valuable commodity for any organization. But without building the foundation first, it could e… Continue reading The Bedrock of Security

Cloud Compliance for Financial Companies Requires a Merger of Three Disciplines

With weightier compliance penalties, ever-deepening cybercrime, and rapid adoption rates of public or hybrid cloud, financial services companies must pay closer attention to cloud compliance and stop treating it in a vacuum.
The post Cloud Complia… Continue reading Cloud Compliance for Financial Companies Requires a Merger of Three Disciplines

How osquery helps secure your cloud with these two critical CIS Benchmark controls

Two of the 6 basic security controls, according to the Center for Internet Security, are focused on the current state of your assets. Assessing the state of your assets has been a priority for years, but the old means aren’t as effective in … Continue reading How osquery helps secure your cloud with these two critical CIS Benchmark controls

Continuous Diagnostics and Mitigation: A Look Back and Preparing for Phase Three

The DHS’s Continuous Diagnostics and Mitigation (CDM) program outlines strategies to help companies address gaps in their cybersecurity architectures.

The post Continuous Diagnostics and Mitigation: A Look Back and Preparing for Phase Three appeared first on Security Intelligence.

Continue reading Continuous Diagnostics and Mitigation: A Look Back and Preparing for Phase Three