

Comparing In-House vs. Outsourced SOC
An In-House SOC gives you tremendous control, oversite, and response capabilities. It's also very expensive to setup and maintain,...
Dec 15, 2023


Understanding SOC as a Service: An Introduction for Beginners
Security Operations Centers (SOC) are a vital part of any organization's cybersecurity program. SOC-as-a-Service (SOCaaS) is a...
Dec 11, 2023


What is SOC-as-a-Service
SOC-as-a-Service (SOCaaS) is a subscription-based cybersecurity solution that outsources monitoring, detection, and incident response. It...
Nov 8, 2023


5 Reasons to Pentest your APIs
APIs are prolific today and much of your core operations leverage them. Most APIs have many unknowns, making them an easy attack vector....
Aug 15, 2022


Using Penetration Tests to Demonstrate ROI
You need to compete for dollars internally to fund your cybersecurity projects Use ROI on prior investments to build confidence for new...
May 20, 2022


Canaries Provide Simple, Effective Cybersecurity
Canaries and Canary Tokens are a “Set It and Forget It” cybersecurity tool When a Canary is triggered, you know immediately that you have...
Mar 30, 2022


In case you are asked: the new Cyber Incident Reporting Act
1. Many organizations are pulled into Critical Infrastructure 2. There's nothing to worry about just yet 3. Stay informed and be ready to...
Mar 18, 2022


How the Government Can Guide Your Zero-Trust Approach
The U.S. Government issued requirements for agencies to meet zero-trust architecture standards by September 2024 Zero-Trust is vital as...
Feb 23, 2022


Get Better Security Culture By Making It Personal
Traditional training approaches do a poor job improving employee behavior. Cybersecurity has a negative impact on culture because it is...
Feb 11, 2022


Phishing Awareness is Important, But....
The field of cybersecurity training and awareness continues to put phishing at the forefront. For many organizations, phishing awareness...
Jan 17, 2022


Misconfigurations for Office 365
Microsoft Office 365 offers so many compelling benefits, from the “work anywhere on anything” to automatic upgrades to subscription plans...
Dec 7, 2021


5 Common Attacks That Dodge Your Firewall.
As your first line of defense, firewalls protect networks and systems against a range of cybersecurity threats coming from the internet...
Nov 15, 2021

4 Pentest Paradoxes You Must Get Right
Penetration testing is the best way to know whether your network or applications have exploitable vulnerabilities. A pentest goes beyond...
Oct 25, 2021
XDR, MDR, SOAR - Acronyms of Cybersecurity Detection & Response
One of the basic cybersecurity needs of businesses today is to detect threats to and within networks and effectively respond to threat...
Oct 12, 2021