Request a Demo
Welcome to the Cygilant Blog

Understanding Cybersecurity Regulations for Banks

Posted by Trevan Marden on Jun 15, 2018

Banks are a prime target for cyberattacks. Banks store and utilize a large volume of confidential data surrounding their client’s personal information, account information, and other data.  For bank leaders, it’s important to understand the unique challenges and regulations you must meet to protect this data. Attacks may range from malware, phishing or DDoS, to sophisticated compound attacks that use multiple methods at once to infiltrate the organizations and compromise security. You must be prepared to prevent, detect, and remediate any potential security incidents. 

The Move Towards “Zero Trust” and the Need for Security Monitoring

Posted by Trevan Marden on Jun 13, 2018

In a recent article for Forbes, Dave Lewis recalls an experience earlier in his career in which the physical access controls to production servers were completely undermined by lack of proper network segmentation. In the article, he notes that traditional network segmentation is now being replaced with movement towards “zero trust.” The concepts of “inside the network” versus “outside the network” are melting away as organizations steadily move towards cloud-based and hybrid infrastructures.

Flash Player Vulnerabilities and Patch Management

Posted by Trevan Marden on Jun 8, 2018

It was reported yesterday that Adobe has once again issued a critical patch for it’s Flash Player browser plugin due to a vulnerability that is being actively exploited to deploy malicious software. We’ve written before about the dangers of Flash and even Adobe has announced it will end support for the software at the end of 2020. However, while many security-minded professionals have heeded the advice to remove or enable click-to-run for this plugin, others have not. Many organizations still rely on websites and software that utilize the plugin for needed functionality and can’t simply remove the software entirely.

Daily Security Briefing - June 8, 2018

Posted by Trevan Marden on Jun 8, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing - June 7, 2018

Posted by Trevan Marden on Jun 7, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing - June 6, 2018

Posted by Trevan Marden on Jun 6, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing - June 5, 2018

Posted by Trevan Marden on Jun 5, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing - June 4, 2018

Posted by Trevan Marden on Jun 4, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

3 Ways SIEM Tools Can Let You Down

Posted by Trevan Marden on Jun 1, 2018

SIEM is a valuable tool in your organization’s security program. These tools can collect and correlate data from a wide range of disparate devices to intelligently identify suspicious activity. However, without proper planning and preparation, these enterprise software purchases can quickly become shelfware. Here are a few ways traditional SIEMs can let you down:

Daily Security Briefing - June 1, 2018

Posted by Trevan Marden on Jun 1, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All