4 06, 2021

Comparing Infosec and Cybersecurity: Two Types of Data Security With a Common Goal

By |2021-06-04T10:40:25-07:00June 4th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps, Secure Compliant Data Platform|

Infosec and cybersecurity are two primary concerns for modern organizations. While they're separate areas, they're very closely linked because so much information is in digital storage. This is especially true given the rapid digital acceleration of 2020, where we saw COVID-19 speed the adoption of digital tools by three to [...]

20 05, 2021

12 Types of Social Engineering Attacks to Look Out For

By |2021-05-20T09:17:21-07:00May 20th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

One of the biggest weaknesses in any organization’s cybersecurity strategy is human error. Social engineering attacks take advantage of this vulnerability by conning unsuspecting people into compromising security and giving out sensitive information. Social engineers use various psychological hacks to trick you into trusting them or create a false sense [...]

13 05, 2021

Beyond Compliance: Data Security and Data Privacy Differences Explained

By |2021-05-13T08:40:53-07:00May 13th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

If your organization collects or manages data, the security and privacy of that data must be one of your top priorities. The handling of sensitive data like identities, finances, or health records requires special attention to stay compliant with privacy regulations and to protect that data from malicious actors. In [...]

11 05, 2021

11 Characteristics of Advanced Persistent Threats (APTs) That Set Them Apart

By |2021-05-11T09:44:16-07:00May 11th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

Advanced persistent threats, or APTs, are groups of people—cybercrime organizations, activist groups, or political organizations—who carry out sophisticated, long-term security breaches. Their very nature makes them difficult to track, and organizations targeted by advanced persistent threats often never find out who exactly is behind them. Traditional security tools like antivirus [...]

7 05, 2021

Data Security Best Practices: Tips for Any Size Organization

By |2021-05-11T09:34:37-07:00May 7th, 2021|Categories: Blog, Critical Infrastructure, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|Tags: , |

No matter how large or small your organization is, the security of your data must be one of your top priorities. While regulations like HIPAA, GDPR, and CCPA provide basic privacy compliance standards for storing, accessing, and transferring information, data security overall is a broader issue that you’ll need to [...]

6 05, 2021

Establishing a Cyber Security Culture: The Balance Between Trust and Risk

By |2021-05-11T09:36:31-07:00May 6th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

A cyber security culture stems from how an organization communicates the need for security and the technology they provide to enable it. It all starts with awareness, in that employees need to know and understand the rules. Unfortunately, that's where a lot of organizations fail. They may have protocols laid [...]

13 04, 2021

5 Ways to Stop a Ransomware Attack

By |2021-04-13T09:18:19-07:00April 13th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

The 1920s—often referred to as the “Roaring Twenties”—produced some key historical figures. One of these whose life both inspired and saddened many people around the world was Charles Lindberg. Hailed as an example of the indomitable human spirit for making the first solo non-stop transatlantic flight of over 2000 miles [...]

6 04, 2021

How to Stop a DDoS Attack Before It Happens

By |2021-04-06T09:59:59-07:00April 6th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

For any business that primarily interacts and does transactions with users online, the last thing you want potential or long-standing customers to see when they are trying to connect with you is the dreaded 404 error screen. It is true that in some cases, this error could indicate a problem [...]

23 03, 2021

Balancing Risk in CIA Triad Availability

By |2021-04-07T08:53:59-07:00March 23rd, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), DevSecOps|

The CIA triad's availability component breaks down to risk management. Organizations need to review their data and consider the risk they're willing to accept in exchange for the convenience of making it available. When those two fall out of balance, breaches occur, or clients can't access the information they need.  [...]

11 03, 2021

6 Top Cloud Security Trends

By |2021-03-11T11:49:20-08:00March 11th, 2021|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

Whenever someone approaches me with the option of hearing the good news or bad news first, I typically try to predict whether the gist of the report is dire or if the good news will outweigh the bad. Based on this prediction, I will request one or the other first, [...]

Load More Posts
Go to Top