Don't second guess. Go with experience.

Blog

Categories

Archives

cybersecurity-awareness

Raising Cybersecurity Awareness: 7 Questions to Ask

Cybersecurity is a team effort. It’s no longer solely the responsibility of IT or cybersecurity departments to defend organizations against cyber attack. Cyber criminals can target any one, across all departments and roles, and this means that everyone plays a part in protecting networks, systems and data. Staying informed about cybersecurity best practices and understanding…

Read More
Election Incident Response Planning

Developing An Incident Response Plan for Elections

Developing an Incident Response Plan is a critical step in designing a strong cybersecurity program. In the event of an attack, a well-constructed plan can be the crucial difference between operating in reactive mode or taking a more proactive stance that thwarts the attack in its early phases and mitigates the potential damage. While it’s…

Read More
Locks protecting a gate to portray the idea of SIEM

What Is SIEM And How To Choose The Right Tool

Understanding, Selecting, and Using SIEM One of the hurdles faced by organizations regarding cybersecurity isn’t just establishing protective measures. It’s also managing the sheer deluge of information regarding security events occurring on any given day. Because of the volume and complexity, businesses often seek out options to simplify the process. One of those options is…

Read More
Human Toll of Cyber Attacks

The Human Toll of Cyber Attacks

It’s one in the morning after Memorial Day, and my friend and I are trying to catch a Lyft home from the airport. The designated ride share area is swarming with people, all tired from long hours in the sun, long island iced teas, (hopefully some long bouts of appreciation for our fallen soldiers), and…

Read More
Rules to Avoid a Phishing Attack

Hard and Fast Rules of Evading Phishing Attacks

While phishing attacks are nothing new, they continue to be more inventive and of an exponentially greater quantity, causing us to pause and revisit what continues to be a serious issue for government organizations, businesses and individuals. The technique of Phishing has been around for years, and hackers continue to use it for one big…

Read More

Assessments Take the Guesswork Out of Election Security

Securing elections sounds as if it should be straightforward, but the reality is it is anything but. It’s far more complex and goes further than securing a network with a firewall or locking down a voting machine. It requires knowing precisely where there are gaps in your entire election process that cyber criminals can exploit….

Read More

Complacency Isn’t Affecting Election Security Progress, Unknowns Are

Recent news articles have focused on the unused HAVA funds that the Federal government has allocated for election security, and the implication is that this inaction is the result of a lack of urgency or a sense of complacency. Those of us on the frontlines of the election security challenge know that the issue is…

Read More

Pursuing Quality Threat Intelligence Insight

Attaining the “correct” Threat Insight By definition, “threat insight” provides an understanding of threats in the context of your company. Insight of any kind is interesting and potentially useful but the most key and critical insight is the insight specifically related to you. In this case, your company and the threats: the known knowns, the…

Read More

The One Thing That Makes Election Security Assessments Actionable

Whether your cybersecurity program is advanced or in its beginning phases, an election security assessment is a significant part of improving your cybersecurity stance. However, an assessment is only one step in strengthening your defenses against cybercrime. The actions and decisions that follow an assessment are the true determining factor of success. The methodologies and…

Read More

Metrics and Threat Intelligence: Why and How to Apply Them

In the maturity process of any organization, at some point metrics enter the equation. For many, this is a cringe-worthy event that ranks up at the top of the worst job-defining moments. It usually starts innocently. Someone asks a question. It could be a simple question, such as “How much money are we spending and…

Read More

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.