Cybersecurity Blog

Featured Post

Update on the California Consumer Protection Act

The California Consumer Protection Act (CCPA) went into effect on January 1, 2020. While no companies have failed to comply (yet), it’s probably only a matter of time. This blog takes a closer look at the CCPA’s requirements, it’s penalties, and ways to make sure you’re always in compliance.


( read )

Tags: data breach, gdpr, cybersecurity,

A Sad Outcome of the Coronavirus: Cyber-attackers Exploiting the Situation

It didn’t take very long for hackers and cyber-attackers to take advantage of the confusion and stresses of COVID-19 felt by...


( read )

Tags: cybersecurity, ransomware, data protection,

Stop Threats With ARIA SDS and SumoLogic's New Integration

A new out-of-the-box integration between Sumo Logic’s Continuous Intelligence Platform and ARIA Cybersecurity Solutions’ ARIA SDS...


( read )

Tags: cybersecurity, siem, intrusion response,

Our Takeaways from the 2020 RSA Security Conference

This year’s RSA Security Conference was a rousing success, even with the onslaught on Covid-19. During our time at the show there...


( read )

Tags: cyber attack, secdevops, cybersecurity

Reap the Benefits of IoT, Without Compromising SCADA Security

Industry 4.0,” the Industrial Internet of Things (IIoT), and other trends are capable of delivering many powerful benefits, but...


( read )

Tags: cybersecurity, IoT, operational technology

Improve the Effectiveness of SOAR Solutions, and Accelerate Threat Detection and Response Times

One way to think of SOAR security solutions is that they’re essentially where man meets machine in the cybersecurity world. Yet...


( read )

Tags: cyber attack, cybersecurity, siem

What is a Threat Attack Surface? And How Can You Minimize Your Risk?

A cyber threat attack surface refers to the digital and physical vulnerabilities in your hardware and software environment. Learn...


( read )

Tags: cyber attack, cybersecurity

Looking Back at Cybersecurity Trends in 2019 (and Ahead to 2020)

A look back at three of the biggest cyber security trends of 2019, and how a new approach to incident response and threat...


( read )

Tags: cyber attack, gdpr, cybersecurity,

Understanding the Strengths and Limitations of Your Intrusion Detection System

Intrusion detection systems (IDS) are a vital consideration in today’s network security environment. But an IDS alone is not a...


( read )

Tags: data breach, cybersecurity, siem