Insight into the World of Cyber Attack

By Eva Prokofiev.

Any mid-sized to large-sized organization with security ops continuously uncovers a wide range of cyber threats. Some of the things that are discovered are relatively innocuous, while others are downright devastating.

6 New Year Promises for your Security Service Provider

By Tony Velleca.

As 2019 is just beginning, we can’t help wondering: What can security service providers expect in the coming year? 

Emerging MSSPs are Making Waves – A New Forrester Report Evaluates 10 Top Vendors

By Howard Silverman.

Forrester, one of the most influential research and advisory firms in the world, just released their report, The Forrester WaveTM: MSSPs Q3 2018

A Needle in a Haystack - Why Your Organization Needs Digital Forensics

By Shiran Grinberg.

If you’re a computer security professional, the question is always there – lurking in the background: Is your security perimeter safe? 

The Magic Mix Needed to Build a Successful SOC

By Roman Bruk.

In today’s business environment  where organizations are increasingly aware of the cyber threats to their businesses – having the capabilities of an advanced

How to Build an Effective Security Perimeter

By Eran Alsheh.

Most organizations today have hybrid IT environment – where, on the one hand, there are legacy systems that are on-premises – and on the other hand, some systems and services are in the cloud.  

Shedding Light on the Darknet 

By Eva Prokofiev.

The darknet refers to a network of computers, nodes and websites that are purposely hidden from the “regular” Internet, or surface net. They are located on a network that’s encrypted – and because it’s encrypted, it’s not searchable by traditional means like a search engine,

Why Cyber Threat Intelligence is Critical to Your Security Coverage

By Eva Prokofiev.

Consider the herculean challenge faced by those responsible for national security. No government can possibly protect its citizens against every single potential attack 

3 Hot Innovations for Cyber Week 2018

By Howard Silverman.

With Cyber Week 2018 fast approaching, we decided to write a series of blogs especially for the occasion – here is the first.  

The 4 Best Cyber Tech Sessions Not to Miss at Cyber Week 2018

By Howard Silverman.

With Cyber Week 2018 fast approaching, we decided to write a series of blogs especially for the occasion – here is the second of three. Read the first here  our guide to 3 top innovations not to miss at Cyber Week. 

Top Takeaways from the 2018 IT Security CISO and Analyst Forum

By Adrian Bisaz.

With data breaches and serious cybersecurity incidents for businesses becoming ever-more common and persistent across an expanding attack surface, and wide-ranging legislative changes such as the European General Data Protection 

5 Tips to Choosing the Right Cyber Security Strategy

By Howard Silverman.

Defending your business from cyber-attack requires a sophisticated security strategy – one that covers everything from DDoS protection, Web application firewalls, and security information management to data loss prevention and much more.  

Our take on the Verizon Data Breach Investigations Report

By Eva Prokofiev.

Verizon’s Data Breach Investigations Report (DBIR) is one of the most respected security research papers around today. Every year the company will shake the security industry with 

What you need to know about cyber maturity and why it matters

By Tony Velleca.

Significant data breaches have become a common occurrence. Just last month, Expedia-owned Orbitz revealed that it had been hacked and 880,000 customer records, including credit card numbers, were likely stolen.