Go Digital Securely … and Fast
Would you trust your money to a bank if it had no vaults and no guards? Of course you do. You do it every day.
Introducing executive dashboards in CTA
No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including “how secure are we?”, “what threats...
Cisco AMP Just Got Better – Enhancements for Continuous Breach Detection, Response, and Remediation
Breaches happen. It makes us cringe to say it, but it’s the obvious truth. A week doesn’t go by that we don’t hear about the latest breach in the news. All of us in the IT security industry would love to say, “our technology can prevent all breaches.” But it’s a pipedream. Being able to […]
A Model for Evaluating Breach Detection Readiness
Given that modern attacks are complex and sophisticated, there is not a single product or tool that will ever be 100% effective at detecting threats. Prevention eventually fails. Therefore, you need protection before, during, and after an attack. Modern-day networks are large and complicated. It is a nightmare for incident response teams and security investigators […]