Contractor Threat blog image

Incoming Cyber Risk: How Your Contractors Can Undermine Your Security

When you think about it, it’s not surprising that contractors pose one of the biggest risks to your organization’s security.

More SaaS apps are unapproved than approved by IT.

Shadow IT: Risks Associated with SaaS App Usage in SMEs

Shadow IT is fundamentally a visibility problem that creates unnecessary risks for SMEs.

Businesses are struggling to cope with the cybersecurity talent shortage.

How SOC-as-a-Service Solves the SME InfoSec Talent Gap

It’ll take an entirely new security model for the SME market to get its head above water, and we believe SOC-as-a-service is that model.

Prudent security investments are the key to better cybersecurity.

Solving the Cyber Preparedness Problem

Poor cyber preparedness doesn’t stem from unwillingness to improve. It’s the outcome of being corralled into security investments that don’t deliver ROI.

Is your organization HIPAA compliant?

A Simplified Regulatory Checklist for Health Care Organizations

What security responsibilities do you have as a health care organization?

There's nothing easy about compliance management for financial institutions.

A Simplified Regulatory Checklist for Financial Institutions

We’ve identified a few core SOC resources, processes and technologies that fundamentally improve compliance management.

What security lessons can we learn from a recent online gaming vulnerability?

Lessons From Recent Network Security Exploits in Online Gaming

Video gaming has been a hotbed of cybersecurity activity for years, with many valuable lessons to offer on major risks as well as techniques for mitigation.

Happy new year!

5 Security Trends and Predictions for 2018

2018 is already here, and that means it’s time to set our sights on the year ahead. Here’s what we expect to see in the next 12 months:

Law firms shouldn't spend another reckless dollar on security solutions that don't work.

Where Should Law Firms Focus Spending on Cybersecurity?

Cybersecurity for law firms, once thought to be a prohibitive expense, is being redefined by SOC-as-a-service. 

Do you have the manpower and the budget to secure your network?

What’s the Ideal Approach to Security Event Monitoring?

Security event monitoring can be approached differently depending on your budget, risk tolerance and use cases.