5 Deception Technologies for Evolving Cyberthreats

Attack, defense, risk, threat. The language of cybersecurity sounds like a glossary of terms for all-out warfare. In many ways, that’s exactly what it is. Cybersecurity is an ongoing, ever-changing battlefront for the protection of your data, your users, your assets and your reputation. For more insight into the shifting landscape of cybersecurity, download our [...]

By |2019-07-18T10:20:14-05:00July 19th, 2019|Blog|Comments Off on 5 Deception Technologies for Evolving Cyberthreats

5 Security Stats You Should Know for 2019

It’s no surprise that a data breach can cost businesses millions of dollars. Organizations must protect their data no matter where it is stored, used or transmitted. Varonis compiled 60 cybersecurity statistics to give you a better idea of the current cybersecurity state, and we’ve broken out five key facts to help you rethink your [...]

By |2019-05-31T10:49:27-05:00June 5th, 2019|Blog|Comments Off on 5 Security Stats You Should Know for 2019

Playing Offense in Today’s Cybersecurity Game

Prevention alone will eventually fail: just read the data breach headlines making news on a weekly—if not daily—basis. Many companies are asymmetrically focused on the defensive role and not focused enough on preparing for the inevitable. Subbing-in an offensive team has its perks. First, let’s go back to the basics: Offense: The action of attacking [...]

By |2019-05-08T10:04:36-05:00May 15th, 2019|Blog|Comments Off on Playing Offense in Today’s Cybersecurity Game

Managing Third-Party Risk: Lessons from the Field

With the growing amount of third-party vendors working with or for your company, it’s imperative to do your due diligence to effectively protect against growing threats that are hitting major third-party vendor and business partners. Third-Party Risk Management Basics Third-party risk management is the process of analyzing and controlling risks to your company’s data, finances [...]

By |2019-04-30T09:39:09-05:00April 29th, 2019|Blog|Comments Off on Managing Third-Party Risk: Lessons from the Field

6 Stages to the Analytics-Driven Security Journey

Splunk recently released a security eBook to help companies understand the challenges and action steps to a security program that utilizes data to stay ahead of attacks. Here is a breakdown of the suggested six stages of the Analytics-Driven Security Journey, so you can get started on your voyage. Stage 1: Collection Collect basic security [...]

By |2019-04-17T09:01:42-05:00April 17th, 2019|Blog|Comments Off on 6 Stages to the Analytics-Driven Security Journey

Sirius Wins 2018 Overall Contributor Award From Check Point

Check Point Software Technologies, a leading provider of threat prevention and cloud security solutions, recognized Sirius with an Overall Contributor award during Check Point Experience 2019. “Sirius and Check Point have partnered to provide customers with a comprehensive security architecture with flexible enforcement points for advanced protection against the latest cyberattacks across North America,” said [...]

By |2019-02-20T14:09:23-05:00February 22nd, 2019|Blog|Comments Off on Sirius Wins 2018 Overall Contributor Award From Check Point

What Do Data Privacy Laws Mean for Your Security Strategy

The EU Global Data Protection Regulation (GDPR) has ushered in an era of user-controlled data. With the January fine of 50 million euros levied against Google for failing to properly disclose to users how their data is collected and used for targeted advertising, data protection authorities (DPAs) in EU member states have made it clear [...]

By |2019-03-08T15:35:41-05:00February 21st, 2019|Blog|Comments Off on What Do Data Privacy Laws Mean for Your Security Strategy

[New Sirius Report] Healthcare Cybersecurity Survey 2018

In 2017, nearly half of the ransomware attacks targeted healthcare organizations. Last year, the biggest healthcare data breaches came as the result of weaponized ransomware, misconfigured cloud storage buckets and, most notably, phishing emails. What does this mean for your healthcare organization? You’ll need to examine your current IT strategy in order to incorporate a [...]

By |2019-02-22T14:56:39-05:00February 18th, 2019|Blog|Comments Off on [New Sirius Report] Healthcare Cybersecurity Survey 2018

Addressing Cybersecurity and the Insider Threat

With attackers routinely stealing credentials and masquerading as legitimate users, the idea that everything on the inside of an organization’s network should be trusted has become antiquated. A 2018 Insider Threat Report from Crowd Research Partners found that 90 percent of organizations feel vulnerable to insider attacks. Enabling risk factors to include too many users [...]

By |2019-02-07T13:32:24-05:00February 4th, 2019|Blog|Comments Off on Addressing Cybersecurity and the Insider Threat

Cybersecurity Focus Areas for the New Year

The seemingly endless list of massive data breaches last year demonstrated just how critical effective cybersecurity has become. Companies in all industries are losing the battle to protect their customers’ data. As we move into 2019, it's important to remember that cybersecurity is about more than protecting information; it’s about neutralizing attacks that can literally [...]

By |2019-04-25T10:26:40-05:00January 14th, 2019|Blog|Comments Off on Cybersecurity Focus Areas for the New Year