Cybersecurity Blog

Featured Post

What Does the SolarWinds Orion Attack Say about the State of Cybersecurity?

While the reports are still rolling in, we have a pretty good understanding of what occurred with the recent SolarWinds attack.


( read )

Tags: cyber attack, cybersecurity, intrusion response,

The Problem with Traditional Approaches to Threat Detection and Response

Let’s face it: The current, standard approach to threat detection and response just isn’t cutting it. But now, a choice of two...


( read )

Tags: cyber attack, cybersecurity, intrusion response,

New Ways to Improve Industrial Cybersecurity (IIoT)

Security and cyber-attack prevention are very real concerns in the industrial sector, especially as more machinery and equipment...


( read )

Tags: cyber attack, data breach, cybersecurity,

Four Cybersecurity Trends in a Post-Coronavirus 2020

A lot has changed in our personal and professional lives with COVID-19. What hasn’t changed, and in fact may be getting worse, is...


( read )

Tags: cyber attack, cybersecurity, ransomware,

Our Takeaways from the 2020 RSA Security Conference

This year’s RSA Security Conference was a rousing success, even with the onslaught on Covid-19. During our time at the show there...


( read )

Tags: cyber attack, secdevops, cybersecurity

Improve the Effectiveness of SOAR Solutions, and Accelerate Threat Detection and Response Times

One way to think of SOAR security solutions is that they’re essentially where man meets machine in the cybersecurity world. Yet...


( read )

Tags: cyber attack, cybersecurity, siem

What is a Threat Attack Surface? And How Can You Minimize Your Risk?

A cyber threat attack surface refers to the digital and physical vulnerabilities in your hardware and software environment. Learn...


( read )

Tags: cyber attack, cybersecurity

Looking Back at Cybersecurity Trends in 2019 (and Ahead to 2020)

A look back at three of the biggest cyber security trends of 2019, and how a new approach to incident response and threat...


( read )

Tags: cyber attack, gdpr, cybersecurity,

What Do the Worst Breaches in History All Have in Common?

A Review of the Nine Worst U.S. Data Breaches Reveals the One Common Element that Led to Disaster

In this blog article, we...


( read )

Tags: cyber attack