Cygilant Blog

Making Security Proactive at Fitchburg State University

Posted by Jeff Pappert on Sep 24, 2020

From time-to-time on this blog we like to take a moment to connect with those folks on the front lines of the cybersecurity battle, to give you a direct look into the issues they’re facing every day. Today, we sat down (virtually) with Sherry Horeanopoulos, the Information Security Officer at Fitchburg State University.

Why I Joined Cygilant | Steven Mulvenna

Posted by Steven Mulvenna on Sep 22, 2020

The COVID-19 pandemic is quickly changing the cybersecurity landscape. One example is the increase in cybersecurity incidents stemming from shadow IT as workers eagerly introduce new technologies and software apps to support their work from home (WFH) environments. Another effect of the pandemic is a rise in attacks against small and medium-sized enterprises (SMEs) as cybercriminals seek to capitalize on resource-constrained businesses.

Affordable SOC-as-a-Service for SMEs

Posted by Steve Harrington on Sep 1, 2020

You may think that a Security Operations Center (SOC) is only for very large companies, but the reality is that malicious actors target any size company. A SOC is simply the epicenter of security, responsible for every aspect of protecting the organization.

College Improves Security Posture with Cygilant Cybersecurity-as-a-Service

Posted by Steve Harrington on Aug 27, 2020

With back to school upon us for universities, colleges and K-12, and unprecedented IT challenges, today we feature one college Cygilant has helped overcome its cybersecurity challenges with Cygilant Cybersecurity-as-a-Service.

5 Reasons to Work with Cygilant

Posted by Steve Harrington on Aug 26, 2020

We all know that it’s hard to navigate the cybersecurity space. From tooling to services, recruiting to resource limitations, it poses many obstacles before you can even begin to combat cyber threats. With that said, if you have identified that you need help, cybersecurity-as-a-service is a great option. It allows you to overcome recruiting challenges, resource constraints and provides help on the tools you need to manage, detect and respond to cyber threats.

5 Steps Towards Improved Cybersecurity with Continuous Security Monitoring

Posted by Kevin Landt on Aug 19, 2020

The challenges to cybersecurity grow more every day. One way to stay on top is to use security monitoring as part of your arsenal of weapons. Here are 5 ways security monitoring can help.

7 Questions to Ask When Prioritizing a Vulnerability

Posted by Kevin Landt on Aug 18, 2020

Vulnerability management is a tough but essential part of business risk management. It is an ongoing process to assess and manage risk.

8 Important Factors to Look for in a SOC as a Service Provider

Posted by Kevin Landt on Aug 13, 2020

When sourcing SOC as a service, it's important to know what you should expect from the provider. Discover 8 important factors to look for when choosing a SOC as a service provider.

Why Security Monitoring and Vulnerability Management

Posted by Steve Harrington on Aug 13, 2020

Selecting your cybersecurity tools and services can be overwhelming. There are so many vendors, so many tools, and so many threats. If one of your biggest problems is resourcing to help you meet all your cybersecurity requirements, then a cybersecurity-as-a-service provider can help. Security monitoring and vulnerability management are two services that when working together can help you prevent cybersecurity threats.

3 Roadblocks to Achieving Vulnerability Management for Resource Constrained Companies

Posted by Steve Harrington on Aug 12, 2020

Managing vulnerabilities is a time-consuming task, particularly for resource constrained companies that don’t have the time, staff or sometimes expertise to investigate. With vulnerabilities caused from complexity, familiarity, connectivity, poor password management, OS flaws, software bugs, unchecked user input and people, it’s hard to keep up. But vulnerabilities can be exploited. Vulnerabilities need to be quickly detected and remediated before they can be exploited.

Most Recent Posts

Subscribe to Email Updates