- Dec 15, 2023
Comparing In-House vs. Outsourced SOC
An In-House SOC gives you tremendous control, oversite, and response capabilities. It's also very expensive to setup and maintain,...
- Dec 11, 2023
Understanding SOC as a Service: An Introduction for Beginners
Security Operations Centers (SOC) are a vital part of any organization's cybersecurity program. SOC-as-a-Service (SOCaaS) is a...
- Nov 8, 2023
What is SOC-as-a-Service
SOC-as-a-Service (SOCaaS) is a subscription-based cybersecurity solution that outsources monitoring, detection, and incident response. It...
- Aug 15, 2022
5 Reasons to Pentest your APIs
APIs are prolific today and much of your core operations leverage them. Most APIs have many unknowns, making them an easy attack vector....
- May 20, 2022
Using Penetration Tests to Demonstrate ROI
You need to compete for dollars internally to fund your cybersecurity projects Use ROI on prior investments to build confidence for new...
- Mar 30, 2022
Canaries Provide Simple, Effective Cybersecurity
Canaries and Canary Tokens are a “Set It and Forget It” cybersecurity tool When a Canary is triggered, you know immediately that you have...
- Mar 18, 2022
In case you are asked: the new Cyber Incident Reporting Act
1. Many organizations are pulled into Critical Infrastructure 2. There's nothing to worry about just yet 3. Stay informed and be ready to...
- Feb 23, 2022
How the Government Can Guide Your Zero-Trust Approach
The U.S. Government issued requirements for agencies to meet zero-trust architecture standards by September 2024 Zero-Trust is vital as...
- Feb 11, 2022
Get Better Security Culture By Making It Personal
Traditional training approaches do a poor job improving employee behavior. Cybersecurity has a negative impact on culture because it is...
- Jan 17, 2022
Phishing Awareness is Important, But....
The field of cybersecurity training and awareness continues to put phishing at the forefront. For many organizations, phishing awareness...
- Dec 7, 2021
Misconfigurations for Office 365
Microsoft Office 365 offers so many compelling benefits, from the “work anywhere on anything” to automatic upgrades to subscription plans...
- Nov 15, 2021
5 Common Attacks That Dodge Your Firewall.
As your first line of defense, firewalls protect networks and systems against a range of cybersecurity threats coming from the internet...
- Oct 25, 2021
4 Pentest Paradoxes You Must Get Right
Penetration testing is the best way to know whether your network or applications have exploitable vulnerabilities. A pentest goes beyond...
- Oct 12, 2021
XDR, MDR, SOAR - Acronyms of Cybersecurity Detection & Response
One of the basic cybersecurity needs of businesses today is to detect threats to and within networks and effectively respond to threat...