Incident Response Plan

Incident Response Planning: Facing the Nightmare to Avoid Real-Life Horror

It’s Halloween, a time to turn our attention to the things that terrify us. In honor of this tradition, consider this creepy scenario: Lifeless eyes dilate at your approach. Battery-operated lungs suck in stale air, hypnotically wheezing with inhuman rhythm. A plastic chest rises and falls. The smooth skin reminds you of your own, only…

Read More
Man checking cyber security on laptop

What is a Firewall and Why Do You Need One?

You may have heard of firewalls and how they are an essential part of your computer and network cybersecurity strategy. In this post, we describe what a firewall is, why they are essential for cybersecurity, and how to set up and maintain your firewall security system. What is a Firewall? A firewall is a device…

Read More

Election Security: Detection and Response

One if by Land, Two if by Sea…Three if by Cyber? What would’ve happened if on that fateful night of Paul Revere’s Ride no one saw the lanterns, or if the watchers completely missed the movement of the British troops? While our Nation’s federal and local officials balance providing insights on cyberthreat activities while assuring…

Read More

The Election Security Conversation: Hype or Headlines?

You’ve likely seen the media coverage describing the current state of election security, and if you only read the headlines the news isn’t good. From coverage of teenagers hacking election databases in ten minutes at DefCon Voting Village  to hackers’ ability to easily manipulate votes on voting machines, the headlines paint a bleak picture. On…

Read More

7 Rules of Cybersecurity Threat Hunting

Threat hunting can and should be a part of your cybersecurity efforts, but the idea of starting a threat hunting and monitoring program can be intimidating. Building a portfolio of threats to watch and determining how to manage the risks they pose to your organization is usually confusing, often misleading and just as often stressful….

Read More
CyberDefenses - Defenses Protection

Your Incident Response Plan Depends on Knowing Your Attack Vectors

by Brian Engle, CISO Similar to businesses, attackers have goals that they set out to achieve. Depending on the attacker, the goals may vary, but ultimately to accomplish objectives an attacker has to utilize an attack vector to break through defenses. Network defenses and cybersecurity protections are the starting point for closing up potential attack…

Read More

DefCon’s Voting Village: Results and Impact

  by Monty St John It’s been a few weeks since DefCon took place in Las Vegas, but the buzz from this year’s event can still be heard echoing throughout cybersecurity circles, particularly elections cybersecurity. Hackers were out in full force to try their hand at breaking into election machines through DefCon’s “Voting Village” this…

Read More

Election Cybersecurity Funding: How Much Is Enough?

by Brian Engle, CISO It would seem that the debate on the Hill over how much funding is needed for securing elections ended before it began. Congress provided funding in the Omnibus budget bill to the tune of approximately $380 million this spring, an allocation that will be divided proportionately among the states. For most…

Read More

Looking Ahead to Growth in Cybersecurity Guidance Services with Key New Hire

by Damon Fleury, CTO While no one would argue that rapid growth is a good thing, most of us would agree that it comes with its challenges. Hiring the right team members to keep pace with a growing customer base and increasing cybersecurity pressures is one of those challenges. It’s certainly more involved than simply…

Read More

CyberDefenses Named Top 10 Best Places to Work by Austin Business Journal

  Saying you’re dedicated to high standards as a company is easy, but it’s much harder to actually live this philosophy. The pace of business is fast, and a commitment to excellence requires thoughtful action and a ton of good old-fashioned hard work. That’s why we are honored to have been selected as one of…

Read More