5 Threat Mitigation Strategies for Network Security

What is the cost of a data breach? $3.86 million, on average. Can your organization afford that? Network security is critical for any company today, especially when we live in an age where data is an organization’s most valuable resource. But pr… Continue reading 5 Threat Mitigation Strategies for Network Security

Leveraging Managed Threat Hunting

The cybersecurity landscape changed drastically on two fronts in 2020: volume and supply chain complexities. Attack surfaces expanded and softened as employees migrated off well-protected corporate networks and logged on from home. As a result, the nu… Continue reading Leveraging Managed Threat Hunting

3 Cybersecurity Goals for CISOs

If 2020 has taught us anything, it’s that anything can happen. Honestly, how many of us had, “I will do my best to avoid a global pandemic,” as a New Year’s resolution for 2020? That said, the chances that 2021 will be even more unpredictable are slim… Continue reading 3 Cybersecurity Goals for CISOs

3 Cybersecurity Goals for CISOs

If 2020 has taught us anything, it’s that anything can happen. Honestly, how many of us had, “I will do my best to avoid a global pandemic,” as a New Year’s resolution for 2020? That said, the chances that 2021 will be even more unpredictable are slim… Continue reading 3 Cybersecurity Goals for CISOs

Achieving Application Security Maturity

Application security, or appsec, is a fast-growing, advanced field of cybersecurity. This field focuses on the unique business applications created by companies large and small. In today’s “Software is eating the world” era, the code developed by comp… Continue reading Achieving Application Security Maturity

Breach Clarity Data Breach Report: Week of March 15

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Data Breach Report: Week of March 15

A Security Vulnerability Management Guide

Living in a container-native world is not easy. Containers have a reputation for being a point of entry for security vulnerabilities for many organizations. In 2015, according to a research paper, over 40% of Docker images distributed through Docker H… Continue reading A Security Vulnerability Management Guide

Network Penetration Testing: A Primer

Today, with the world adjusting to the new normal, preparing for cyberattacks requires stringent protective strategies. Experts predict that in 2021, a cyberattack will occur every 11 seconds (nearly twice as frequently as in 2019). Is your network pr… Continue reading Network Penetration Testing: A Primer

RPA’s Impact on Governance, Risk Management and Compliance

Intelligent automation (IA) is transforming the way organizations operate everything from finance to operations and human resources. Basic robotic process automation (RPA), or advanced process developments such as artificial intelligence (AI), can unl… Continue reading RPA’s Impact on Governance, Risk Management and Compliance

4 Security Awareness Training Trends

The year 2020 was all about the pandemic. It pushed security teams to the edge, required creative problem-solving skills, great teamwork and investment and optimization of security tools. The year 2020 also showed organizations how important security … Continue reading 4 Security Awareness Training Trends