- Here is the list of top 5 emerging vendors of MDR Solutions (Managed Detection and Response). But before that let us understand what is the difference between MDR and MSS (Managed Security Services).
MDR vs MSS
- MDR is different from MSS. Managed
Here is the list of top 5 vendors emerging Threat Hunting tools, but before that let us understand what threat hunting exactly refers to.
We are super excited to have Terry Cutler (voted #1 Top Influencer in CyberSecurity by IFSEC Global 2018) do a web conference as part of our Kids Cyber Safety Initiative. As a part of his talk he will talk about internet safety for students, social
Here we will explore the Shadow IT Risks for OT Departments. Operations Technology groups can be an integral part of important business functions like production, maintenance and more. This means there are a lot of IT related functions which can be
If you’re thinking that the industry you’re operating in is safe from cybersecurity threats then you might have to think again. In this article, we’ll specifically discuss the implications of breaches on healthcare businesses and why is annual penetr
As our world embraces a digital transformation, innovative technologies bring greater opportunities, cost efficiencies, abilities to scale globally, and entirely new service capabilities to enrich the lives of people globally. But there is a catch.
Topic of discussion : The Talent Shortage in Cybersecurity
Listen To Podcast: https://player.captivate.fm/episode/6c842a64-cff1-4119-beb3-1989940c47cf
Thank you Katelyn Ilkani, I thoroughly enjoyed discussing the challenges of the talent shortage in cy
As I am expanding my responsibilities to cover some exciting data security topics (like, say, our cloud data discovery DLP), I wanted to briefly discuss a few broader issues I have noticed related to moder
This post is my admittedly imperfect attempt to “reconnect” data security controls to threats. It is also my intent to continue pulling on the thread I touched in this post— so expect more posts about that.
Let’s first get this out of the way: there a
A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position to understand how vulnerable major companies a
Being a champion for digital privacy is no easy task. The perception of privacy and its importance is constantly in flux and radically different around the globe. I am honored to be a part of this dynamic and determined community that protects and
[Posted on Behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author]
Cyber-Security Skills Gap
Recent events have brought attention to cyber-security, and the need for highly skilled, and trained cyber-secur
Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you
Please, subscribe to get an access.