Digital forensics and incident response is an important part of business and law enforcement...
Security & Compliance Blog
The Windows Curveball Vulnerability and What You Can Do About It
What is Curveball? I like to watch baseball, and am amazed at pitchers who can throw a good...
Introduction to Information Security Management Systems (ISMS)
Every technology-driven business process is exposed to security and privacy threats. Sophisticated...
Too Many Vulnerabilities and Too Little Time? Why Automation is...
Too Many Vulnerabilities and Too Little Time? Why Automation is an Imperative For today’s security...
SecOps in Action, and how you can benefit from it
In my previous post “What is SecOps and how can you maximize its potential?”, I defined SecOps as...
Enterprise Password Management Best Practices
Choosing a password for an account used to be easy. Take your pet’s name, add an anniversary or...
What is SecOps and how can you maximize its potential?
“SecOps” is the intersection of Security and Operations teams within an IT organization. Often...
The Benefits of Using an MSSP
According to a recent report released from Accenture, cybercrime will cost companies over $5.2...