SOCaaS balances out executives hopes and fears around SaaS.

How to Deal with C-Suite and Boardroom Concerns About Cybersecurity

Executives want SaaS, but they also need security and compliance. Here’s how they can get both. 

Debunking Cybersecurity Myths: Part III—24×7 Security Monitoring IS Essential

Because hackers operate around the clock from all over the world, even as you sleep

Arctic Wolf’s CEO Plays Nostradamus: Brian NeSmith’s Cybersecurity Predictions for 2019

So, what will 2019 bring? In a recent webinar, Arctic Wolf’s CEO Brian NeSmith offered key insights on the state of cybersecurity today and his predictions for 2019.

JW Marriot logo on device

Marriott Breach Exposes 500 Million Guest Records: Preliminary Lessons

On Friday, Marriott International announced its Starwood reservation system’s database had been hacked and personal details from up to 500 million guest records were compromised.

Debunking Cybersecurity Myths: Part II—Sorry, the Cloud Won’t Save Us

We now move from age-old to brand-new in this episode and address the growing misconception around an increasing shift to cloud services.

Debunking Cybersecurity Myths: Part I—No, Really, Antivirus Is Dead

Practices from the 90’s don’t have the same place in today’s hyperconnected world. Like antivirus solutions. Here’s why:

A few simple steps can go a long way toward better cybersecurity.

Steps to Improve Cyber Awareness in Your Organization

Better cybersecurity starts with exemplary security hygiene. Here are a few tips to get you where you’re going. 

Security experts help businesses stop threats in their tracks.

How Cybersecurity Professionals Serve Businesses

The most crucial infosec function is “security operations,” and in particular, threat detection and incident response.

2 terabytes of data have been compromised, affecting as many as 340 million people.

Don’t Be the Next Exactis: How Your Firm Can Avoid a Damaging Data Breach

Exactis has exposed a projected 340 million records by storing them on a public-facing server.

The IoT creates many new vulnerable connections.

How Continuous Monitoring and SOC-as-a-Service Secure IoT-Connected Devices

In the final part of this series on IoT security, we examine the roles of 24/7 monitoring and security operations centers.