The future of SOCs: Automation where it matters

Sophisticated attacks, remote work needs and rapidly changing technologies challenge organizations to manage IT security while containing costs and using overburdened staff. Security operations centers (SOCs) increasingly use automation to manage compl… Continue reading The future of SOCs: Automation where it matters

The enemy of vulnerability management? Unrealistic expectations

Organizations vary by size, industry, level of maturity, but one thing that they all have in common is needing to know how to quickly remediate security vulnerabilities. As an experienced vulnerability management professional and a former system admini… Continue reading The enemy of vulnerability management? Unrealistic expectations

How a cyber asset management strategy can help enterprises detect threats

Whether it’s through stolen credentials, phishing attacks, or simply user errors, people continue to pose the greatest risk to cybersecurity. While behavioral attacks are nothing new, Verizon’s recently released Data Breach Investigations Report shows … Continue reading How a cyber asset management strategy can help enterprises detect threats

How parents can talk about online safety and personal info protection with their kids

Gen Zers might seem like digital pros but, they often aren’t armed with enough resources to keep themselves safe online. The FBI reported that, in 2020 alone, there were 23,200 internet crime complaints filed by victims under 20 years old, which … Continue reading How parents can talk about online safety and personal info protection with their kids

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have proliferated in the last decade. The numbers are staggering if not overwhelming, … Continue reading Detection, isolation, and negotiation: Improving your ransomware preparedness and response