Skip to main content

Archived News

CyberDefenses Security Insights Newsletter

Security Insights Newsletter Banner
Managed Security Services Provider delivering cybersecurity assessments and guidance, 24/7 Security Operations Center threat monitoring, cyber intelligence and more since 2001. CONTACT US.
CyberDefenses View
  • Beyond business impacts of attacks, there are devastating personal consequences.
  • Up your cybersecurity savvy by asking these 7 questions.
  • Learn how to choose the right SIEM for your organization.
In the Headlines
  • Developing a cybersecurity strategy? Here are some things to consider.
  • Learn what experts are warning state and local officials to be prepared for.
  • Find out why cybersecurity is stil so complex.
  • What are the 5 experimental cybersecurity trends you need to know.
  • Read about the key takeaways from the latest State of the SOC report.
Upcoming Events
  • Here are the events that should be on your calendar!

The Human Toll of Cyber Attacks

Even if we just see the missing numbers, the shifting data on a digital spreadsheet, there are always the folks on the other side of the computer, feeling the real ramification of those numbers. Because the enemy is out there working. And even though the average man might not be the target (although many times we are), no one is immune from the attacks.

Raising Cybersecurity Awareness: 7 Questions to Ask
Cybersecurity is a team effort. It’s no longer solely the responsibility of IT or cybersecurity departments to defend organizations against cyber attack. Cyber criminals can target any one, across all departments and roles, and this means that everyone plays a part in protecting networks, systems and data. We’ve put together seven questions you can ask your IT and cybersecurity teams to initiate crucial conversations about how you can best serve as a line of defense for your employer.

What Is SIEM and How to Choose the Right Tool
One of the hurdles faced by organizations regarding cybersecurity isn’t just establishing protective measures. It’s also managing the sheer deluge of information regarding security events occurring on any given day. Because of the volume and complexity, businesses often seek out options to simplify the process. One of those options is SIEM, a valuable tool for cybersecurity teams.

What to Consider When Developing a Cybersecurity Strategy

In a world where devices of all types are connected to networks, the need to maintain strong cybersecurity is greater than ever. For organizations, particularly those that retain financial and other sensitive company and customer data, cybersecurity is critical, as the results of a network breach could be catastrophic. When developing the cybersecurity strategy, the following five factors are key to ensuring that physical security and other devices provide strong protection to prevent network breaches.

Cybersecurity Officials Warn State and Local Agencies to Fend Off Ransomware

The three steps urged by CISA, MS-ISAC, NGA, and NASCIO are fairly basic security hygiene: run daily backups, train staff on "cybersecurity awareness," and "revisit and refine cyber incident response plans." Unfortunately, these three steps may be beyond the capabilities of the organizations most likely to be hit by ransomware—school districts, government agencies, and small and mid-sized businesses that have IT budgets that place them below the information security poverty line.

Why Complexity Issues Persist in SIEM and Cybersecurity

Solutions Review
Recently, a survey by the Ponemon Institute, sponsored by AttackIQ, unveiled complexity issues and visibility issues in enterprise cybersecurity. In “The Cybersecurity Illusion: The Emperor Has No Clothes,” Ponemon surveyed 577 IT and IT security practitioners in the United States. They discovered that though enterprises spend an average of $18.4 million annually on cybersecurity, data breaches persist. 

5 Experimental Cybersecurity Trends Your Business Needs to Know About

While some trends, including container security and software defined networking, have seen great interest and adoption, a number of emerging cybersecurity trends fall into an "experimental" category, representing conceptual or early-stage trends with few functional products that have not yet reached widespread adoption. However, these trends have sparked proof-of-concept work, and companies should be on the lookout for their spread in the future.

Exabeam 2019 State of the SOC Report: 5 Key Takeaways

CIOs and CISOs are increasingly concerned about incident response, automation and threat hunting; conversely, security operations center (SOC) analysts prioritize procedure and policy, monitoring security tools and investigations, according to the Exabeam “2019 State of the SOC Report.”

Black Hat USA 2019

We're looking forward to seeing the innovations that come out of this year's Black Hat event!
Las Vegas, Nevada
August 3 - 8

Election Center 35th Annual National Conference

Look for the CyberDefenses exhibit table and speak with us about what we're doing to secure states and counties from election cyber attacks. 
Orlando, FL
August 17 - 21