Passwords. We all have to use them, and like underwear, we have to change them, too. So, what makes a good password? And what makes a good change cycle? Here are six things to keep in mind: Length matters. Strong passwords have a minimum of eight or nine characters. Like a cake, you have to […]
Phishing is one of today’s largest cybersecurity threats. With 90% of data breaches tracing back to a phishing email, it’s crucial that members of your organization don’t fall victim. In this article, we’ll provide a comprehensive guide on how you can stay safe from phishing attacks. We’ll break down what exactly phishing is, how it […]
It’s Monday morning. You sit at the computer, enter your login credentials, slam the ‘Enter’ button, and sigh when your phone goes off in, what always seems to be, any room but the one you’re in. Yes, the ritualistic hunt for your phone has its purpose. Let’s talk about multi-factor authentication, or MFA. Put simply, […]
With organizations today focusing their security efforts on ransomware detection, phishing prevention, and command and control monitoring, many tend to overlook one of the simplest, non-human security weaknesses: Unpatched systems. While exploits to vulnerabilities on unpatched systems don’t cause as many breaches as phishing or social engineering do, they still cause nearly 10% (Verizon Breach […]
Choosing a Cybersecurity Professional Services (PS) provider is similar to choosing any other professional provider. Think about how you would go about choosing a doctor, lawyer, or mechanic. Would you look at reviews? Seek out referrals? Conduct brief phone interviews? The process for choosing a PS provider is largely the same. In this article, we’ll […]
A law passed by Congress late last year allocated $1 billion in cybersecurity grants for state and local governments to improve their digital defenses.
Editor’s Note: This article is co-authored by Barry Duncan, Team Lead, Professional Services Observability; and Chase Yates, Practice Manager, Security. A common problem technology teams face is the high volume of noise in their environments and the resulting alert fatigue. Items clamoring for an analyst’s attention can include: Threats Anomalies Incidents Notable Events According to […]
If you work in the cybersecurity sector, you know that the U.S. Department of Defense (DoD) is rolling out a Cybersecurity Maturity Model Certification program, or CMMC, to create stronger cybersecurity standards for contractors working in the DoD supply chain. Over 300,000 firms either currently do business within the Defense Industrial Base (DIB) or intend […]
File system permissions in Linux can be worrisome Splunk administrators. Here are some tips that balance Splunk Administration and system controls.
Learn how threat intelligence helps incident response teams respond efficiently and effectively to unexpected incidents.
- 1
- 2