Cybersecurity Blog

Featured Post

Beyond the Stack: A Single Solution for Enterprise-wide Threat Detection and Response

While many cybersecurity professionals have come to believe adding more tools to their security stack gives more protection, we think a single tool is more effective—and provides much better ROI.

( read )

Tags: cybersecurity, intrusion response, data protection,

Enterprise-wide Threat Detection and Response Becomes Easy with a Cloud-based AI SOC Solution

Many organizations are moving their business applications, processes, and operations into the cloud in order to take advantage...

( read )

Tags: cyber attack, cybersecurity, data protection

SPE Selects ARIA microHSM for VMware Key Encryption

SPE, a managed IT services provider serving the healthcare and telecommunications industries, has deployed the ARIA microHSM...

( read )

Tags: data breach, cybersecurity, data protection

ARIA Cybersecurity Solutions Delivers Modern microHSM Solution for Enterprise-wide Data Encryption

The ARIA microHSM solution is a SmartNIC based Hardware Security Module (HSM) that provides organizations with a simple to...

( read )

Tags: cybersecurity, ransomware, data protection

ARIA Cybersecurity Offers Free Use of ARIA ADR to Organizations Affected by “SUNBURST” Enabled Cyber Attack

The recently discovered cyber attack that is running rampant through U.S. Government agencies and commercial global...

( read )
What Does the SolarWinds Orion Attack Say about the State of Cybersecurity?

While the reports are still rolling in, we have a pretty good understanding of what occurred with the recent SolarWinds attack.

( read )

Tags: cyber attack, cybersecurity, intrusion response,

Top Security Trends for 2021 (and What They Mean for You)

2020 was a crazy year, and one none of us is likely to forget. But as we look ahead to 2021, here are five cybersecurity...

( read )

Tags: data breach, cybersecurity, intrusion response,

Three Trends Shaping the Future of the Security Operations Center (SOC) Today

It’s easy to suggest that the COVID-19 pandemic has had the greatest impact on any company’s security operations center (SOC)...

( read )

Tags: cybersecurity, intrusion detection

The Problem with Traditional Approaches to Threat Detection and Response

Let’s face it: The current, standard approach to threat detection and response just isn’t cutting it. But now, a choice of two...

( read )

Tags: cyber attack, cybersecurity, intrusion response,

Part Two: The Cybersecurity Maturity Model Certification (CMMC) Explained in More Detail

In our first blog in this series, we introduced the new Cybersecurity Maturity Model Certification (CMMC) and described the...

( read )

Tags: cybersecurity, data protection, intrusion detection