Infosecurity Blogs
Start Early and Secure Containers Across Their Lifecycle
While containerization increases application deployment speed, it opens up a new range of security risks
Is In-House Data Destruction Really Necessary? The Answer Is a Big Yes!
To guarantee data is wholly obliterated, it must be destroyed in-house with adequately rated equipment
Tales from the SOC: A Major Office 365 Compromise
A SOC analyst team reveal detail a recent Office 365 cyber incident, and how the threat was mitigated
SQL Server Disaster Recovery: Key Considerations
Define the success metrics, choose a backup strategy and leverage SQL availability features
A 10-Step Best Practice IAM Guide for Azure and AWS
Cloud providers like Amazon Web Services and Microsoft Azure have several crucial options for IAM policies
The Role of Active Directory in a Layered Security Strategy
How securing AD factors into preventing, detecting and responding to attacks
Cost of a Data Breach vs. Hard Drive Crusher: How You Can Save Millions
Companies with proper data security and end-of-life data destruction methods pay significanty less
How to Get Started with Implementing the Cybersecurity Maturity Model Certification (CMMC)
Any organization looking to toughen its cybersecurity practices can and should strive to meet CMMC.
Why Privileged Access Management Matters
Privileged access management encapsulates a cyber security strategy used to protect assets, people, and processes against cyber threats
Seasonal Attacks: The Cybersecurity Implications of Children Returning to School
By taking just a few simple steps, organizations can cover all seasonal attack angles comprehensively and effectively
BloodHound and Purple Knight: Better Together for Hardening Active Directory Security
Blue and red teams can benefit from using these free tools to harden the defenses of their Active Directory environments
Evaluating Your Defenses: The Importance of Establishing Mature SOC Processes
Enterprises must be more than secure, they must be cyber resilient. To achieve this, they need robust processes that enable real-time effectiveness
How to Achieve Cloud Operational Excellence
The journey to cloud excellence starts with developing the metrics that are most relevant to your business goals.
How Access Reviews Can Prevent Access Creep
Combining a zero trust strategy with regular access reviews can ensure no system is exposed
Level 6 Data Centers: Best Practices in Security
Level six data centers offer the utmost advances in modern data security
Hybrid Cloud Systems Management: Four Processes to Prioritize
Four critical processes to more effectively manage hybrid environments and maximize investment in the cloud.
The Link Between the Champions League and Cyber-Attacks
Users have been setting both personal and memorable terms such as football club names for their passwords
Offline Backups Versus Cloud Backups - Which One Should You Choose?
The smartest move is a multi-layered, multi-location approach that covers maximum eventualities — both online and offline
SOC Analyst of the Future: The Impact of Accelerating Transformation
Regardless of whether or not you outsource your security operations, developing your SOC from a people, process and technology perspective is paramount
Records Retention Schedules: When Will Your Data Expire?
Why establishing an RRP is crucial in ensuring corporate documents are managed and destroyed in a lawful, effective and efficient way