Cybersecurity

/Tag:Cybersecurity
­
  • Sirius receives RSA America Growth Partner of the Year Award

Sirius Wins RSA America Growth Partner of the Year

RSA Security, a leading provider of cyber threat detection and response, identity and access management, online fraud prevention and governance, risk and compliance solutions has recognized Sirius as its 2018 Growth Partner of the Year. "The RSA America Growth Partner of the Year Award recognizes Sirius' work with RSA to help customers manage risk as [...]

By |October 22nd, 2018|Blog|Comments Off on Sirius Wins RSA America Growth Partner of the Year
  • Physical storage container security

Understanding Container Security: Kernel Exploits, DDoS Attacks & Poisoned Images, Oh My!

Approximately 17,000 security executives, analysts, hackers, academics and government/law enforcement staffers from 112 countries filled the Mandalay Bay Hotel for Black Hat USA 2018. Now in its 21st year, the conference was immediately followed by the 26th anniversary of DEF CON, a less corporate, more festival-like conference at Caesar’s Palace that attracted an even larger [...]

By |August 31st, 2018|Blog|Comments Off on Understanding Container Security: Kernel Exploits, DDoS Attacks & Poisoned Images, Oh My!

The GDPR Deadline Is Here: Are You Ready?

For many organizations, building and operating a cutting edge data protection program hasn’t been a top priority. The GDPR is ushering in a new era of accountability, in which every regulated organization that collects, stores and uses sensitive customer data needs to raise the bar to meet new standards. Are you GDPR compliant? Penalties for [...]

By |May 30th, 2018|Blog|Comments Off on The GDPR Deadline Is Here: Are You Ready?

Cyber Deception and the Path to Hacking Back

RSA Conference 2018 featured hundreds of sessions covering today’s cybersecurity issues. The theme was “Now Matters,” and among the immediate issues featured was the question of whether companies should engage in active defense, or “hacking back.” The idea of hacking back has been discussed by security researchers for over a decade. Dave Dittrich, SANS instructor [...]

By |May 3rd, 2018|Blog|Comments Off on Cyber Deception and the Path to Hacking Back

10 Tips to Improve Your IT Security Strategy

Is your organization reevaluating its security strategy for 2018? Start the year off right by assessing your security posture, and formulating a plan. Here are 10 tips to help you advance your cybersecurity strategy: 1. Know what you need to protect The first step in any IT security strategy: know what you need to protect. [...]

By |February 2nd, 2018|Blog|Comments Off on 10 Tips to Improve Your IT Security Strategy

Put Up Your Dukes Before the Next Cyberattack

Cybercrime is one of the greatest threats to organizations. According to CSO, global ransomware damages costs are predicted to exceed $5 billion in 2017, and the human attack surface will reach four billion people by 2020. However, insider breaches can also wreak havoc on organizations. So, what can you do to protect your enterprise from [...]

By |December 11th, 2017|Blog|Comments Off on Put Up Your Dukes Before the Next Cyberattack

Center for Internet Security’s Top 5 Controls

The Center for Internet Security (CIS) is a nonprofit organization formed in 2000 to “identify, develop, validate, promote and sustain best practice solutions for cyber defense, and build and lead communities to enable an environment of trust in cyberspace.” Its CIS Controls is a prioritized set of actions that protect your critical systems and data [...]

By |November 13th, 2017|Blog|Comments Off on Center for Internet Security’s Top 5 Controls

The Top Three Requirements for Securing Endpoints

Admit it—when you were a kid, you checked your closet for monsters or underneath your bed, fearing that your worst nightmare was out to get you. For IT leaders, there’s something a lot scarier than the boogeyman: a security breach. Desktops, laptops, smartphones and tablets are endpoints that represent vulnerable points of entry for cybercriminals. [...]

By |October 11th, 2017|Blog|Comments Off on The Top Three Requirements for Securing Endpoints

Are Data Breaches an Uphill Battle?

According to 24/7 Wall Street’s recent article, the Identity Theft Resource Center (ITRC) reported that data breaches are currently pacing 30% higher than 2016. ITRC has been tracking data breaches since 2005, and since then they’ve counted 7,656 breaches through June 20, 2017, involving nearly 900 million records. Remain two steps in front of cybercriminals [...]

By |August 2nd, 2017|Blog|0 Comments

What You Need to Know About the 23 NYCRR 500

Effective March 1, 2017, Maria T. Vullo, New York’s Superintendent of Financial Services, promulgated Part 500 of Title 23 of the Official Compilation of Codes, Rules and Regulations establishing cybersecurity requirements for financial services companies operating in the State of New York. The general purpose of the regulation is to ensure that financial services entities [...]

By |May 31st, 2017|Blog|0 Comments