Don't second guess. Go with experience.

Blog

Uncategorized

Categories

Archives

Election Incident Response Planning

Developing An Incident Response Plan for Elections

Developing an Incident Response Plan is a critical step in designing a strong cybersecurity program. In the event of an attack, a well-constructed plan can be the crucial difference between operating in reactive mode or taking a more proactive stance that thwarts the attack in its early phases and mitigates the potential damage. While it’s…

Read More
Locks protecting a gate to portray the idea of SIEM

What Is SIEM And How To Choose The Right Tool

Understanding, Selecting, and Using SIEM One of the hurdles faced by organizations regarding cybersecurity isn’t just establishing protective measures. It’s also managing the sheer deluge of information regarding security events occurring on any given day. Because of the volume and complexity, businesses often seek out options to simplify the process. One of those options is…

Read More
Human Toll of Cyber Attacks

The Human Toll of Cyber Attacks

It’s one in the morning after Memorial Day, and my friend and I are trying to catch a Lyft home from the airport. The designated ride share area is swarming with people, all tired from long hours in the sun, long island iced teas, (hopefully some long bouts of appreciation for our fallen soldiers), and…

Read More

Assessments Take the Guesswork Out of Election Security

Securing elections sounds as if it should be straightforward, but the reality is it is anything but. It’s far more complex and goes further than securing a network with a firewall or locking down a voting machine. It requires knowing precisely where there are gaps in your entire election process that cyber criminals can exploit….

Read More

What Is Digital Forensics?

Cybersecurity includes a vast number of different components, aspects, techniques and disciplines. From cyber intelligence to continuous threat monitoring and risk assessments, the full spectrum of cybersecurity activities spans an extensive range. One discipline within this range is digital forensics, and like all of the other activities in the security world, fully understanding what it…

Read More

Securing the Cloud

The freedom of access – to anything, anytime and anywhere – is the strength and peril of the cloud.  While the cloud empowers accessibility, its ubiquitous nature can also undermine security.  The same avenues that give us access to information we want and need also open ways for hackers and malicious actors to reach us….

Read More

Training Can Have a Powerful Impact on Election Security

Cybersecurity attackers work pretty much like we all do – finding the easiest way to get the job done. You can have the most sophisticated security measures in place and use the most sophisticated technology, configured correctly and adherent to all regulations and policies, but if your team is not security-savvy, attackers will easily find…

Read More
Factor in AI when working with SIEM.

Artificial Intelligence Is Only As Good As Our Input

Much of the intelligence and SIEM tools cybersecurity and IT pros use day in and day out have a machine learning component that falls into the category of Artificial Intelligence (AI). For example, it could be argued that the AlienVault Unified Security Management (USM) product, with SIEM capabilities, operates with some AI characteristics and capabilities….

Read More

What Is Cyber Intelligence?

In February 2002, Donald Rumsfeld, then US Secretary of State for Defense, stated at a briefing, “There are known knowns. There are things we know that we know. There are known unknowns. That is to say, there are things that we now know we don’t know. But there are also unknown unknowns. There are things…

Read More

Protect 2020: Now Is the Time to Secure the Election

We may feel that there is still time to prepare for the 2020 election, but cyberattackers are already actively seeking ways to undermine it. Election attacks typically start long before the actual election. Threat actors seek to infiltrate systems by stealing valuable login credentials through methods like phishing or purchasing stolen data in underground markets,…

Read More

Contact CyberDefenses to speak with us about defending your organization against cyber threats.