1. lock with digital graphics

    The Critical Incident Response Maturity Journey

    The best way I have found to measure the level of maturity of an organization’s CIRC is by considering its maturity against the three well established and tightly interrelated categories of: people, processes, and technology. Great technology in the wrong hands isn’t a path to success for detection or response.…Read More

  2. cyber security threat

    Incident Response: How to Fight Back

    Incident Response (IR) teams are designed to detect, investigate and, when necessary, perform remediation in the event of a critical incident. This whitepaper explores the results of the latest SANS survey, providing a picture of what IR teams are up against today—the types of attacks they see, what defenses they have in place to detect and respond to these threats, and their perceived effective…Read More

  3. globe financials

    Who’s Using Cyberthreat Intelligence and How?

    As malware becomes more commercialized, attackers are leveraging the same attack kits again and again. Cyber Threat Intelligence (CTI) offers the ability to detect attacks carried out using methods previously reported by others in the threat intelligence network. In the latest SANS Cyber Threat Intelligence (CTI) Survey, 69% of respondents said their organizations are now using CTI to some extent.…Read More

  4. alt digital

    The Perfect Rx for HIPAA Compliance

    If you work in a small-to-medium-sized enterprise (SME), you know how challenging securing your technology assets can be. Your boss wants the same level of security that Fortune 500 companies enjoy, but doesn’t understand how much that costs, in terms of software, hardware and, most importantly, the specialized talent required to operate it. Attackers understand the challenges SMEs face, too. An…Read More

  5. threat magnified

    Practical Threat Management and Incident Response for the Small to Medium Sized Enterprise

    If you work in a small- to medium-sized enterprise (SME), you know how challenging securing your technology assets can be. Your boss wants the same level of security that Fortune 500 companies enjoy, but doesn’t understand how much that costs, in terms of software, hardware and, most importantly, the specialized talent required to operate it. Attackers understand the challenges SMEs face, too. A…Read More

  6. cloud lock

    Cloud Security Spotlight Report

    Cloud adoption is increasing quickly as organizations are looking to reduce IT cost, increase agility and better support business functions. However, cloud security issues remain a key concern and critical barrier to faster adoption of cloud services. This report is the result of comprehensive research in cooperation with the 250,000+ member Information Security Community on LinkedIn to explore th…Read More

  7. cloud design

    Security Best Practices for Amazon Web Services

    Amazon Web Services is one of the most secure public cloud platforms available, with deep datacenter security and many user-accessible security features. But, don’t forget that you are still responsible for everything you deploy on top of AWS, and for properly configuring AWS security features. This paper covers AWS security best practices to get you started and focus your efforts as you begin t…Read More

  8. credit cards desgin

    Unify Your Defenses and Accelerate PCI DSS 3.0 Compliance

    Companies affected by the Payment Card Industry Data Security Standard (PCI DSS) are required to meet a wide range of technical and operation requirements. Addressing these standards is not simply a matter of avoiding penalties; it’s about incorporating security best practices that protect cardholder data into everyday activities. Cybexa provides a fast and cost-effective way for teams with a li…Read More

  9. Lock security breach

    6 Steps to Surviving Your First Breach

    So, you’ve come to terms with the truth of the world; eventually, you’re going to suffer a major security breach. Being breached doesn’t determine whether or not you’ve got a good security program in place, but how you respond does. So, what actions can you take now that will bear fruit when you have the entire executive team breathing down your neck for answers they wanted an hour ago? It…Read More