3 Ways Paid Threat Intelligence Outperforms Open-Source Threat Information

In an everyday context, there isn’t much difference in the value or definition of “information” versus “intelligence.” But in the military, data and information are gathered, evaluated and analyzed to produce intelligence that can be acted on. And, according to the Center for Internet Security (CIS), threat intelligence is what threat information becomes “once it [...]

Steering Clear of Security Breaches: Maintaining Cloud Integrity in 2020

With more large-scale cloud database breaches in the news seemingly weekly, as well as many different solution providers and offerings to research and choose from, it’s understandable why some companies might still be reluctant to make their maiden cloud voyage. While the looming threat of hackers and security breaches should not be taken lightly, the [...]

3 Essential Cybersecurity Strategies for 2020

One of the biggest challenges for IT security teams is trying to keep pace with the staggering number of new threats and attack surfaces. There are also an increasing number of tools and strategies recommended to handle this challenge. Cut through the complexity with these three crucial strategies for improved cybersecurity. Implement identity and access [...]

Case Study: Transforming Security for a Widely Dispersed Organization

A construction and real estate corporation with over 1,200 employees and 25 business entities in 35 locations needed to ensure the integrity and availability of their data and systems. With help from Sirius, the client developed a foundation for— and implemented ongoing processes to ensure — a strong security program. The results were outstanding: Reduced [...]

5 Ways to Get Wise on Business Email Compromise (BEC)

NPR’s All Things Considered recently ran a story about the persistence of email cybercrimes and the techniques used by cybercriminals to steal money from their victims. This year alone, the U.S. Department of Justice, in collaboration with other government departments, seized nearly $3.7 million stolen through BEC schemes. Scammers still use the oldest trick in [...]

2019 Sirius Security Executive Briefing: Denver Edition

  The shifting landscape of cybersecurity threats, tools and best practices challenges even the most experienced and supported IT teams. How can a CISO adapt to and navigate these issues? To help clients explore the new realities of cybersecurity, Sirius hosts twice-yearly Security Executive Briefings. Each Briefing has a different venue, agenda and speakers, but [...]

What the WAF? Beyond the Capital One Breach

Capital One made world news waves on July 19, 2019, when it was reported they had suffered a security breach that resulted in the loss of 30GB of data. This data loss affected 106 million people in North America and included data submitted on credit card applications from 2005 to early 2019. Lots of digital [...]

3 Cybersecurity Trends From Black Hat 2019 for Your 2020 Security Strategy

Experts presented, vendors exhibited, and decision-makers gathered. The 22nd Black Hat conference drew over 20,000 people in the Information Security industry to Las Vegas in early August. People in the InfoSec industry worldwide view this conference as the one to attend for skill-building, hearing the latest research, learning about evolutions in security, and seeing the [...]

Network Visibility Converges Networking and Digital Security

More data is in motion on your network than ever before. This is true for most U.S. enterprises, in every industry. BYOD, remote work, workflow apps and IoT devices—all access the network, whether at the edge or closer to the data center. With the variety and sheer numbers of users, devices and data sources on [...]

Dwell Time, Agent Smith and Modernizing Your SIEM

The more data, users and devices there are, the more points of vulnerability and risks of cyberattack there are. So why are so many IT departments relying on out-of-date cybersecurity technologies? For some, this is a byproduct of a limited budget or the skills shortage. For others, the lack of a significant incident might be [...]