top of page
Search
Comparing In-House vs. Outsourced SOC
An In-House SOC gives you tremendous control, oversite, and response capabilities. It's also very expensive to setup and maintain,...
Understanding SOC as a Service: An Introduction for Beginners
Security Operations Centers (SOC) are a vital part of any organization's cybersecurity program. SOC-as-a-Service (SOCaaS) is a...
What is SOC-as-a-Service
SOC-as-a-Service (SOCaaS) is a subscription-based cybersecurity solution that outsources monitoring, detection, and incident response. It...
5 Reasons to Pentest your APIs
APIs are prolific today and much of your core operations leverage them. Most APIs have many unknowns, making them an easy attack vector....
Using Penetration Tests to Demonstrate ROI
You need to compete for dollars internally to fund your cybersecurity projects Use ROI on prior investments to build confidence for new...
Canaries Provide Simple, Effective Cybersecurity
Canaries and Canary Tokens are a “Set It and Forget It” cybersecurity tool When a Canary is triggered, you know immediately that you have...
In case you are asked: the new Cyber Incident Reporting Act
1. Many organizations are pulled into Critical Infrastructure 2. There's nothing to worry about just yet 3. Stay informed and be ready to...
5 Companies That Want Your Pentest
Manufacturers should get a penetration test at least annually There are 5 companies that want your pentest, and they have very different...
5 Pentest Reports
(and the audiences that want them) Pension Plans should get a penetration test annually There are 5 audiences for your pentest, and they...
The 5 Audiences for your Pentest
(and the reports you need to give them) Law firms should get a penetration test annually There are 5 audiences for your pentest, and they...
How the Government Can Guide Your Zero-Trust Approach
The U.S. Government issued requirements for agencies to meet zero-trust architecture standards by September 2024 Zero-Trust is vital as...
Get Better Security Culture By Making It Personal
Traditional training approaches do a poor job improving employee behavior. Cybersecurity has a negative impact on culture because it is...
Phishing Awareness is Important, But....
The field of cybersecurity training and awareness continues to put phishing at the forefront. For many organizations, phishing awareness...
Misconfigurations for Office 365
Microsoft Office 365 offers so many compelling benefits, from the “work anywhere on anything” to automatic upgrades to subscription plans...
5 Common Attacks That Dodge Your Firewall.
As your first line of defense, firewalls protect networks and systems against a range of cybersecurity threats coming from the internet...
4 Pentest Paradoxes You Must Get Right
Penetration testing is the best way to know whether your network or applications have exploitable vulnerabilities. A pentest goes beyond...
XDR, MDR, SOAR - Acronyms of Cybersecurity Detection & Response
One of the basic cybersecurity needs of businesses today is to detect threats to and within networks and effectively respond to threat...
kenballard13
Dec 15, 20235 min read
Comparing In-House vs. Outsourced SOC
An In-House SOC gives you tremendous control, oversite, and response capabilities. It's also very expensive to setup and maintain,...
34 views1 comment
kenballard13
Dec 11, 20236 min read
Understanding SOC as a Service: An Introduction for Beginners
Security Operations Centers (SOC) are a vital part of any organization's cybersecurity program. SOC-as-a-Service (SOCaaS) is a...
10 views0 comments
kenballard13
Nov 8, 20232 min read
What is SOC-as-a-Service
SOC-as-a-Service (SOCaaS) is a subscription-based cybersecurity solution that outsources monitoring, detection, and incident response. It...
35 views0 comments
kenballard13
Aug 15, 20225 min read
5 Reasons to Pentest your APIs
APIs are prolific today and much of your core operations leverage them. Most APIs have many unknowns, making them an easy attack vector....
46 views0 comments
kenballard13
May 20, 20225 min read
Using Penetration Tests to Demonstrate ROI
You need to compete for dollars internally to fund your cybersecurity projects Use ROI on prior investments to build confidence for new...
49 views0 comments
Alisha Carmichael
Mar 30, 20225 min read
Canaries Provide Simple, Effective Cybersecurity
Canaries and Canary Tokens are a “Set It and Forget It” cybersecurity tool When a Canary is triggered, you know immediately that you have...
126 views0 comments
kenballard13
Mar 18, 20222 min read
In case you are asked: the new Cyber Incident Reporting Act
1. Many organizations are pulled into Critical Infrastructure 2. There's nothing to worry about just yet 3. Stay informed and be ready to...
100 views
kenballard13
Mar 14, 20225 min read
5 Companies That Want Your Pentest
Manufacturers should get a penetration test at least annually There are 5 companies that want your pentest, and they have very different...
32 views0 comments
kenballard13
Mar 11, 20225 min read
5 Pentest Reports
(and the audiences that want them) Pension Plans should get a penetration test annually There are 5 audiences for your pentest, and they...
14 views0 comments
Ken Ballard
Mar 10, 20225 min read
The 5 Audiences for your Pentest
(and the reports you need to give them) Law firms should get a penetration test annually There are 5 audiences for your pentest, and they...
17 views
bottom of page