Request a Demo
Welcome to the Cygilant Blog

Credential Stuffing

Posted by Cygilant on Apr 22, 2019

How to Protect Against Credential Stuffing Attacks

It’s impossible to miss the reports of massive, high-profile data breaches. Adobe, Ancestry, Bitly, Comcast, Dropbox, Equifax, Google+, Marriott Starwood, T-Mobile, Ticketfly, LinkedIn, Yahoo and many other companies have leaked massive amounts of personal information, such as user names and passwords. But you may not be aware of what happens to this data after it’s been stolen.

Cybercriminals often purchase stolen data on the Dark Web. For example, on February 17, 2019, a hacker going by the name Gnosticplayers put eight hacked databases containing data for 92.75 million users on sale for 2.6249 bitcoins (about $9,300) on the Dark Web Marketplace known as Dream Market. Previously, the same hacker had posted a batch of 16 databases containing data for 620 million users and another batch of eight databases with data from 127 million users.

NYDFS - Are You Prepared to Comply with All 4 Phases?

Posted by Cygilant on Apr 1, 2019

How Security-as-a-Service gives you a leg up in developing a comprehensive cybersecurity plan

If you’re one of the thousands of banks, mortgage companies, insurers and other financial service firms that do business in the state of New York, your deadline to complete the final phase of compliance with the New York Department of Financial Services (NYDFS) Cybersecurity Regulation is upon you.  

On March 1, 2019, you are required to ensure that third-parties who access your customers’ private data have security protections in place. This measure comes on the heels of three previous sets of requirements, rolled out in phases beginning in March of 2017, designed to address today’s increasingly sophisticated cybersecurity threats.

Welcoming Rob Scott as CEO!

Posted by Rob Scott on Mar 26, 2019

As you may have heard, earlier today I was officially named as the new CEO of Cygilant [link to press release]. I’m thrilled to be able to finally share this news with you all, and very eager to see what the future holds for the company. 

Despite only being a recent addition, I can already see that there’s something special going on here. Something it feels great to be a part of.

8 Important Factors to Look for in a SOC as a Service Provider

Posted by Lydia Dwyer on Mar 11, 2019

When sourcing SOC as a service, it's important to know what you should expect from the provider. Discover 8 important factors to look for when choosing a SOC as a service provider.

Almost half of CIOs said cybersecurity was a top concern for their organizations in 2018. As threats continue to evolve, it’s unlikely this concern is going to go away in 2019 or beyond.

FFIEC Data Encryption Standards: What You Need to Know!

Posted by Lydia Dwyer on Feb 26, 2019

 

Want to make sure your company is Federal Financial Institutions Examination Council (FFIEC) compliant? Then check out this guide to FFIEC data encryption standards, describing how you can ensure your organization complies with the FFIEC's encryption requirements.

Cybersecurity standards set the minimum requirements to protect your business systems and data. Complying with government and industry data security standards can cost a business millions – and the costs have been increasing in recent years. Concerns about technology and data security are also on the rise, which in turn has led to new rules and new regulations.

How to Use the Microsoft Secure Score – A Step by Step Guide

Posted by Justin Quinn on Feb 12, 2019

Microsoft Security Score is a free security tool that every organization can use to better understand and improve its security position against today’s advanced threats.

In this blog, I’ll provide a step-by-step guide on how to use, and get the most out of, this free tool to improve your organization’s security posture.

Managed SOC: A Beginner's Guide to a Security Operations Center

Posted by Justin Quinn on Jan 9, 2019

In 2018 the average cost of a data breach to an individual company was $3.86 million.

Many small to mid-sized companies wouldn't survive a major breach, but also can't afford to operate a full-scale security operations center (SOC).

The costs, in both physical and human capital, are simply out of their reach.

Thankfully, SOC as a service is now a fully realized and effective way to protect your organization from a cyber attack.

Keep reading to find out how you can benefit from SOC-as-a-Service.

Happy Holidays! 5 Ways to Give Back

Posted by Marissa Wilson on Dec 20, 2018

In mid-December of this year, Cygilant was fortunate enough to participate in a great cause. Our building management team invited every company to participate in a Holiday Gift Drive for Children, through the Massachusetts Department of Children and Families. Once a company elects to participate in the drive and provides the number of employees participating, the building management sends a list of children who, due to circumstances out of their control, do not have any family to provide them gifts during the Holiday season. Each employee is given the child’s age, gift requests in order of need/desire and clothing size. Once the gifts are wrapped and labeled, Cygilant delivered them to the building management team, who will share them with the Social Workers and children.

What Happens if I Fail to Meet FFIEC Guidelines?

Posted by Andrew Igel on Dec 4, 2018

Financial institutions face approximately 85 serious cyber attacks each year. Of these attacks, one-third succeed. While this may not seem like a large number, consider that these threats put people's money at risk each time.

Threats led to the introduction of the Federal Financial Institutions Examination Council (FFIEC). The FFIEC has created security guidelines since 1979. Security risks have changed and increased since the establishment of the guidelines.

That's why the FFIEC examination handbook gets updated regularly. These updates keep up with new risks and changing technology.

4 Things to Look for in a Patch Management Solution

Posted by Trevan Marden on Aug 3, 2018

We’ve seen all too often that the cause of the major breaches we see in the news is failure by the organization to patch a software vulnerability for which a patch has long been available. As a result, more and more organizations are looking for solutions that help make the process of identifying and deploying patches easier and more automated. If you’re looking for a solution for patch management, here are four things to consider:

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Recent Posts

Posts by Topic

See All