2019 Sirius Security Executive Briefing: Denver Edition

  The shifting landscape of cybersecurity threats, tools and best practices challenges even the most experienced and supported IT teams. How can a CISO adapt to and navigate these issues? To help clients explore the new realities of cybersecurity, Sirius hosts twice-yearly Security Executive Briefings. Each Briefing has a different venue, agenda and speakers, but [...]

By |2019-11-11T12:42:16-06:00November 11th, 2019|Blog|Comments Off on 2019 Sirius Security Executive Briefing: Denver Edition

What the WAF? Beyond the Capital One Breach

Capital One made world news waves on July 19, 2019, when it was reported they had suffered a security breach that resulted in the loss of 30GB of data. This data loss affected 106 million people in North America and included data submitted on credit card applications from 2005 to early 2019. Lots of digital [...]

By and |2019-10-30T09:28:24-06:00October 23rd, 2019|Blog|Comments Off on What the WAF? Beyond the Capital One Breach

3 Cybersecurity Trends From Black Hat 2019 for Your 2020 Security Strategy

Experts presented, vendors exhibited, and decision-makers gathered. The 22nd Black Hat conference drew over 20,000 people in the Information Security industry to Las Vegas in early August. People in the InfoSec industry worldwide view this conference as the one to attend for skill-building, hearing the latest research, learning about evolutions in security, and seeing the [...]

By |2019-10-30T09:28:52-06:00September 13th, 2019|Blog|Comments Off on 3 Cybersecurity Trends From Black Hat 2019 for Your 2020 Security Strategy

Network Visibility Converges Networking and Digital Security

More data is in motion on your network than ever before. This is true for most U.S. enterprises, in every industry. BYOD, remote work, workflow apps and IoT devices—all access the network, whether at the edge or closer to the data center. With the variety and sheer numbers of users, devices and data sources on [...]

By |2019-10-30T09:29:17-06:00August 23rd, 2019|Blog|Comments Off on Network Visibility Converges Networking and Digital Security

Dwell Time, Agent Smith and Modernizing Your SIEM

The more data, users and devices there are, the more points of vulnerability and risks of cyberattack there are. So why are so many IT departments relying on out-of-date cybersecurity technologies? For some, this is a byproduct of a limited budget or the skills shortage. For others, the lack of a significant incident might be [...]

By |2019-10-30T09:29:44-06:00August 5th, 2019|Blog|Comments Off on Dwell Time, Agent Smith and Modernizing Your SIEM

5 Deception Technologies for Evolving Cyberthreats

Attack, defense, risk, threat. The language of cybersecurity sounds like a glossary of terms for all-out warfare. In many ways, that’s exactly what it is. Cybersecurity is an ongoing, ever-changing battlefront for the protection of your data, your users, your assets and your reputation. For more insight into the shifting landscape of cybersecurity, download our [...]

By |2019-07-18T10:20:14-06:00July 19th, 2019|Blog|Comments Off on 5 Deception Technologies for Evolving Cyberthreats

5 Security Stats You Should Know for 2019

It’s no surprise that a data breach can cost businesses millions of dollars. Organizations must protect their data no matter where it is stored, used or transmitted. Varonis compiled 60 cybersecurity statistics to give you a better idea of the current cybersecurity state, and we’ve broken out five key facts to help you rethink your [...]

By |2019-05-31T10:49:27-06:00June 5th, 2019|Blog|Comments Off on 5 Security Stats You Should Know for 2019

Playing Offense in Today’s Cybersecurity Game

Prevention alone will eventually fail: just read the data breach headlines making news on a weekly—if not daily—basis. Many companies are asymmetrically focused on the defensive role and not focused enough on preparing for the inevitable. Subbing-in an offensive team has its perks. First, let’s go back to the basics: Offense: The action of attacking [...]

By |2019-05-08T10:04:36-06:00May 15th, 2019|Blog|Comments Off on Playing Offense in Today’s Cybersecurity Game

Managing Third-Party Risk: Lessons from the Field

With the growing amount of third-party vendors working with or for your company, it’s imperative to do your due diligence to effectively protect against growing threats that are hitting major third-party vendor and business partners. Third-Party Risk Management Basics Third-party risk management is the process of analyzing and controlling risks to your company’s data, finances [...]

By |2019-04-30T09:39:09-06:00April 29th, 2019|Blog|Comments Off on Managing Third-Party Risk: Lessons from the Field

6 Stages to the Analytics-Driven Security Journey

Splunk recently released a security eBook to help companies understand the challenges and action steps to a security program that utilizes data to stay ahead of attacks. Here is a breakdown of the suggested six stages of the Analytics-Driven Security Journey, so you can get started on your voyage. Stage 1: Collection Collect basic security [...]

By |2019-04-17T09:01:42-06:00April 17th, 2019|Blog|Comments Off on 6 Stages to the Analytics-Driven Security Journey