The first step in our process is "Assess" which aligns closely with the Five Functions of NIST. The main two reasons we start here are simple: 1: you can't protect what you don't know you have, 2:...
We were at the Western Manufacturing Technology Show two weeks ago and it was clear that many companies we were talking to had a very narrow view of cyber risks.
According to Wikipedia: Cyber resilience refers to an entity's ability to continuously deliver the intended outcome, despite cyber attacks. Resilience to cyber attacks is essential to IT systems,...
Now that it is becoming clear that blocking 100% of cyber attacks is not possible, that prevention, damage control and a recovery plan are the most efficient strategies: Managed Detection and...
We are all familiar with the concept of technical debt (more here), but I think it is time that we start talking specifically about cybersecurity debt.
There was great feedback and some questions about our Cybersecurity 101 blog, this 201 blog will answer those and help you to continue improving your cyber resiliency. The assumption here is that you...
SIEM can make the difference between stopping an attacker while they get started vs after they've setup their entire plan, but how much should it cost?
Cyber Resilience cannot be achieved by just buying another product and the reason for that is quite simple: you need someone to pay attention 24/7. This is how you keep everything up to date,...
There’s been a lot of press about cybersecurity insurance in 2022, the main reason being that crimes are up, so payouts were up, and as we all know, insurance companies don’t like to pay (prevention...
You’ve heard about cybersecurity; you want some and not sure where to start? This cybersecurity 101 is the right place! It explores some of the basic concepts of cybersecurity and provides you...