About Chris Hoke

Chris Hoke is a Managing Director of Security Solutions at Sirius.

Playing Offense in Today’s Cybersecurity Game

Prevention alone will eventually fail: just read the data breach headlines making news on a weekly—if not daily—basis. Many companies are asymmetrically focused on the defensive role and not focused enough on preparing for the inevitable. Subbing-in an offensive team has its perks. First, let’s go back to the basics: Offense: The action of attacking [...]

By |2019-05-08T10:04:36-05:00May 15th, 2019|Blog|Comments Off on Playing Offense in Today’s Cybersecurity Game

Managing Third-Party Risk: Lessons from the Field

With the growing amount of third-party vendors working with or for your company, it’s imperative to do your due diligence to effectively protect against growing threats that are hitting major third-party vendor and business partners. Third-Party Risk Management Basics Third-party risk management is the process of analyzing and controlling risks to your company’s data, finances [...]

By |2019-04-30T09:39:09-05:00April 29th, 2019|Blog|Comments Off on Managing Third-Party Risk: Lessons from the Field

What Do Data Privacy Laws Mean for Your Security Strategy

The EU Global Data Protection Regulation (GDPR) has ushered in an era of user-controlled data. With the January fine of 50 million euros levied against Google for failing to properly disclose to users how their data is collected and used for targeted advertising, data protection authorities (DPAs) in EU member states have made it clear [...]

By |2019-03-08T15:35:41-05:00February 21st, 2019|Blog|Comments Off on What Do Data Privacy Laws Mean for Your Security Strategy

Addressing Cybersecurity and the Insider Threat

With attackers routinely stealing credentials and masquerading as legitimate users, the idea that everything on the inside of an organization’s network should be trusted has become antiquated. A 2018 Insider Threat Report from Crowd Research Partners found that 90 percent of organizations feel vulnerable to insider attacks. Enabling risk factors to include too many users [...]

By |2019-02-07T13:32:24-05:00February 4th, 2019|Blog|Comments Off on Addressing Cybersecurity and the Insider Threat

Marriott Breach Highlights Need for Integrated Cybersecurity

During the first half of 2018, “mega breaches” involving one million compromised records or more entered the cybersecurity lexicon, exposing the records of more than 100 million people and threatening consumer trust. Now, as we approach the end of the year, the world’s largest hotel chain is set to shatter consumer data breach records. On [...]

By |2019-01-07T16:58:44-05:00December 3rd, 2018|Blog|Comments Off on Marriott Breach Highlights Need for Integrated Cybersecurity

Sirius Wins RSA America Growth Partner of the Year

RSA Security, a leading provider of cyber threat detection and response, identity and access management, online fraud prevention and governance, risk and compliance solutions has recognized Sirius as its 2018 Growth Partner of the Year. "The RSA America Growth Partner of the Year Award recognizes Sirius' work with RSA to help customers manage risk as [...]

By |2018-12-26T21:41:29-05:00October 22nd, 2018|Blog|Comments Off on Sirius Wins RSA America Growth Partner of the Year

Sirius Wins Tufin Partner of the Year Award

Network Security Policy Orchestration solutions provider Tufin® has recognized Sirius as its 2017 Partner of the Year for the West region. The award recognizes the Tufin channel partner that has delivered the most value to the region—and to clients—during the past year. “When we evaluate potential partners, the first thing we look for is how [...]

By |2018-12-26T21:41:42-05:00August 7th, 2018|Blog|Comments Off on Sirius Wins Tufin Partner of the Year Award

Ensuring Effective IoT Security

According to Gartner by 2020, one-third of successful attacks experienced by enterprises will be on data located in shadow IT resources, including shadow Internet of Things (IoT). The reality is that IT is not in control of IoT adoption. IT was outpaced by BYOD, and IoT is growing even faster. With the number of connected devices [...]

By |2018-12-26T21:41:46-05:00July 20th, 2018|Blog|Comments Off on Ensuring Effective IoT Security

Put Up Your Dukes Before the Next Cyberattack

Cybercrime is one of the greatest threats to organizations. According to CSO, global ransomware damages costs are predicted to exceed $5 billion in 2017, and the human attack surface will reach four billion people by 2020. However, insider breaches can also wreak havoc on organizations. So, what can you do to protect your enterprise from [...]

By |2018-12-26T21:42:10-05:00December 11th, 2017|Blog|Comments Off on Put Up Your Dukes Before the Next Cyberattack

How Vulnerable Is Payment Card Data?

According to the Identity Theft Resource Center and CyberScout, the number of U.S. data breaches tracked through the end of June hit a half-year record high of 791. If you’re accepting credit or debit cards, you need to have the proper procedures and technologies in place to protect your organization from compromise. The Payment Card [...]

By |2018-12-26T21:42:18-05:00September 15th, 2017|Blog|Comments Off on How Vulnerable Is Payment Card Data?