-
IT Security Demystified
During this webinar, we will demystify the IT security layers required to mitigate risk and improve your firm’s security posture. We will address security for firms housing data and applications…
-
A Day at MSSP Alert Live
Late last week, while working with my team on our continued search for a Next Gen Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), and User…
-
A Primer on Vulnerability Management
You are a business that stores data on your organization’s network and wants to keep the network as secure as possible. Protecting your business assets has become a complex challenge…
-
Three Tips on Why Multi-Factor Authentication is Critical to Data Security
Cybercrime is rife in 2022. Kaspersky released a new report revealing a growing number of cyberattacks on small businesses so far in 2022. Researchers compared the period between January and April 2022…
-
2022 RSA Conference – 3 Key Takeaways
According to this article by CRN about this year’s RSA Security Conference, “cybersecurity is now in ‘fast-forward’ mode where attendees are almost in awe at the transformation of the industry…
-
Security Lesson #7: The Essentials of Implementing Effective Perimeter Security
As I highlighted in my first post, no company or government agency is immune to cyberattacks, and these attacks are a growing threat to every organization. To protect against these attacks, you need…
-
Security Lesson #6: What Are Endpoints and How Do You Secure Them?
In our last post, we talked about application security and how the security measures at the application level prevent data or code within the application from being stolen or hijacked.…
-
Security Lesson #5: How to Think about Your Application Security Strategy
This is the latest post in our Security Lessons series. In my last two posts, I explained what data security is and outlined data security best practices. In this post,…
-
Top 5 Cybersecurity Trends in 2022: Pandemic-Level Ransomware, Talent Gap, Government Involvement, Threat Intel Availability, and more
It’s no secret that cybersecurity attacks and breaches have accelerated in recent years, but the growing impact and volume of such attacks has entered the public eye more aggressively than…
-
Advisory: Apache Log4j Vulnerability Log4j zero-day vulnerability AKA Log4Shell (CVE-2021-44228)
What is the Log4j vulnerability? On December 9, a remote code execution (RCE) vulnerability was identified in Java logging library Apache Log4j, which is a ubiquitous software component used throughout…
-
Security Lesson #4: Build Your Data Security Strategy on Best Practices
The data security layer is about protecting the data you have. It includes the different cybersecurity practices that you use to secure your data and prevent data breaches and misuse.…
-
Security Lesson #3: What Is Data Security (and Why It’s Important)
Data Security: Protecting sensitive data from unauthorized access In Security Lesson #1, we talked about the importance of a business impact analysis and the nine questions you need to ask…