Request a Demo
Welcome to the Cygilant Blog

4 Things to Think About When Buying Managed Detection and Response

Posted by Trevan Marden on Apr 20, 2018

If you are thinking of buying a managed detection and response (MDR) service, then you already know how these services can help your organization achieve security and compliance while reducing costs. These services can help by extending your team and offloading certain tasks related to security monitoring to a third-party, freeing up your team to better focus their efforts. But do you know what to look for in managed detection and response vendors? What sets some providers apart from others? Here are four important items to consider when buying an MDR:

Daily Security Briefing - April 20, 2018

Posted by Trevan Marden on Apr 20, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing - April 19, 2018

Posted by Trevan Marden on Apr 19, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing - April 18, 2018

Posted by Trevan Marden on Apr 18, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

Thanks, Facebook

Posted by Joseph Murphy on Apr 17, 2018

If you watched Zuck testify in Congress in early April 2018, you could feel the nation’s mindset around security and data privacy shifting in a positive direction. The people not in the security community learned that even when they think they’re protecting their data, they’re not. They might be asking themselves, what can I do to protect my data online? Delete my Facebook? Throw my cell phone into the abyss? Close my bank account? Then, you realize, we’d be lost without these life lines.

Daily Security Briefing - April 17, 2018

Posted by Trevan Marden on Apr 17, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

What Are The Vulnerability Scan Requirements for PCI?

Posted by Miguel De Los Santos on Apr 16, 2018

In this blog post, we will cover the vulnerability scan requirements for Payment Card Industry Data Security Standard (PCI DSS). The adoption of these requirements helps ensure that your environment is not only compliant with PCI regulations, but also meets best security practices. This vulnerability data can also help provide a deeper understanding of your environment and where time and attention needs to be spent.

Daily Security Briefing - April 16, 2018

Posted by Trevan Marden on Apr 16, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

5 Steps to Effective Threat Detection

Posted by Trevan Marden on Apr 13, 2018

Cyber attacks are waged against organizations of all sizes and industries. It is more critical than ever that these organizations find ways to effectively detect and mitigate threats. For organizations looking to build out their threat detection capabilities and avoid disaster, here are 5 steps to effective threat detection:

Daily Security Briefing - April 13, 2018

Posted by Trevan Marden on Apr 13, 2018

Grab your coffee and read up on today's top information security stories and articles from around the web:

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All