Cygilant Blog

Affordable SOC-as-a-Service for SMEs

College Improves Security Posture with Cygilant Cybersecurity-as-a-Service

5 Reasons to Work with Cygilant

5 Steps Towards Improved Cybersecurity with Continuous Security Monitoring

7 Questions to Ask When Prioritizing a Vulnerability

8 Important Factors to Look for in a SOC as a Service Provider

Why Security Monitoring and Vulnerability Management

3 Roadblocks to Achieving Vulnerability Management for Resource Constrained Companies

SOC-as-a-Service in Practice: 3 Examples of How a SOC Helps

A Modern SOC Meets a Modern SIEM

Working from Home – The New Norm, Part 2: Chatting With Dermot Murray and Natalie Brady

Introducing the “Working From Home – The New Norm” Blog Series

ACET During the Coronavirus: Then and Now

Cygilant Hiring Seven Positions in Belfast

What is SOC-as-a-Service?

Cygilant Welcomes Kevin Gannon as Vice President of Engineering

Cygilant Cyber Security Survey of Your Peers

Cygilant Adds Belfast Location to its Global Cybersecurity-as-a-Service

What is a Security Operations Center (SOC)?

Credit Union Audits & Examinations During Coronavirus – What To Expect

MDR Vendor Requirements for Financial Services

From The Phones: Cooper Mooney

A 5-Part Plan for Evaluating a Financial Services MDR Solution

Cygilant Endpoint Security: Powerful and Cost-Effective

What is the CMMC and Where to Start

What is Cybersecurity-as-a-Service?

Managed Detection and Response: The Right Fit for Financial Services

Encryption: Safe or Harmful Q&A

Encryption: Your Biggest Security Threat?

Cybersecurity Preparedness: 4 Suggestions for Every Company

Cygilant Enhances Socvue Platform for faster threat detection and response

Five Reasons You Should Join Cygilant

GhostCat Vulnerability Affects Apache Tomcat

Cygilant Wins Gold in the Info Security PG’s 2020 Global Excellence Awards

Out at RSA This Week? Come See Us!

Cygilant | Barac Partnership

Employee Spotlight: Steve Harrington, Vice President of Marketing

Introducing the From The Phones Blog Series

FFIEC Audit Preparedness: 15 Tips

What’s Going On In Your Cloud?

10 Cybersecurity Predictions for 2020

Top 25 List of Online Cybersecurity Resources

The Difference Between Data Privacy and Data Security

3 Cybersecurity Trends to Put into Action Today

Credit Unions: How to Prepare for the ACET with Security as a Service

Just Say No to the Latest Cybersecurity Tools, Say Yes to Security as a Service

10 Reasons to Consider a Managed Security Service

Credential Stuffing

NYDFS - Are You Prepared to Comply with All 4 Phases?

Welcoming Rob Scott as CEO!

FFIEC Data Encryption Standards: What You Need to Know!

How to Use the Microsoft Secure Score – A Step by Step Guide

Managed SOC: A Beginner's Guide to a Security Operations Center

Happy Holidays! 5 Ways to Give Back

What Happens if I Fail to Meet FFIEC Guidelines?

4 Things to Look for in a Patch Management Solution

Should You Switch from SMS-based Two-factor Authentication to U2F Fobs?

AWS Security and Monitoring: What You Need to Know

Banks Seeing More Security Incidents than Ever

4 Questions You Need to Ask About Managed Detection and Response

Blackhat 2018: What to Expect

Cybersecurity Hiring and Skills Gap is Still a Challenge

How Vulnerability Management Prevents Hacks

Software Patching: Difficult But Critical for All Industries

Are Managed Security Services Right for You?

WPA3 Is Coming. How Should Your Security Program Change?

SOC as a Service is More Than Security Automation

Overcoming Cybersecurity Challenges with Managed Security Services

Understanding Cybersecurity Regulations for Banks

The Move Towards “Zero Trust” and the Need for Security Monitoring

Flash Player Vulnerabilities and Patch Management

Daily Security Briefing - June 8, 2018

Daily Security Briefing - June 7, 2018

Daily Security Briefing - June 6, 2018

Daily Security Briefing - June 5, 2018

Daily Security Briefing - June 4, 2018

3 Ways SIEM Tools Can Let You Down

Daily Security Briefing - June 1, 2018

Daily Security Briefing - May 31, 2018

Daily Security Briefing - May 30, 2018

Daily Security Briefing - May 29, 2018

GDPR is Here. Are You Compliant?

Daily Security Briefing - May 25, 2018

Daily Security Briefing - May 24, 2018

Daily Security Briefing - May 23, 2018

Daily Security Briefing - May 22, 2018

SOCVue Patch Management for Windows Patch Management

Daily Security Briefing - May 21, 2018

What to Know About FFIEC Compliance

Daily Security Briefing - May 18, 2018

Daily Security Briefing - May 17, 2018

3 Ways Integrating Vulnerability and Patch Management Helps Protect Data

Daily Security Briefing - May 11, 2018

Daily Security Briefing - May 10, 2018

Daily Security Briefing - May 9, 2018

Automation Can’t Replace Role of People in Security

Daily Security Briefing - May 8, 2018

Daily Security Briefing - May 7, 2018

Top 3 Benefits of a 24/7 SOC Service

Daily Security Briefing - May 4, 2018

Daily Security Briefing - May 3, 2018

Daily Security Briefing - May 2, 2018

Daily Security Briefing - May 1, 2018

Daily Security Briefing - April 30, 2018

3 Reasons to Consider SOC as a Service

Daily Security Briefing - April 27, 2018

Daily Security Briefing - April 26, 2018

Top 5 Things to Look For In Your Next SIEM Solution

Daily Security Briefing - April 25, 2018

Daily Security Briefing - April 24, 2018

Daily Security Briefing - April 23, 2018

4 Things to Think About When Buying Managed Detection and Response

Daily Security Briefing - April 20, 2018

Daily Security Briefing - April 19, 2018

Daily Security Briefing - April 18, 2018

Thanks, Facebook

Daily Security Briefing - April 17, 2018

What Are The Vulnerability Scan Requirements for PCI?

Daily Security Briefing - April 16, 2018

5 Steps to Effective Threat Detection

Daily Security Briefing - April 13, 2018

Daily Security Briefing - April 12, 2018

Daily Security Briefing - April 11, 2018

Daily Security Briefing - April 10, 2018

Three Things All MDR Services Have in Common

Daily Security Briefing - April 9, 2018

Increase ROI with Managed Security Services

Daily Security Briefing - April 6, 2018

Proper Segregation of a Network

Daily Security Briefing - April 5, 2018

TLS 1.3 is Faster and More Secure

Daily Security Briefing - April 4, 2018

Daily Security Briefing - April 3, 2018

The Disconnect Between CIO, IT Manager, and Security Engineer

Daily Security Briefing - April 2, 2018

You Have a Vulnerability Scanner. Now What?

Daily Security Briefing - Friday, March 30, 2018

4 Tips for Choosing a Managed Security Service

Daily Security Briefing - Thursday, March 29, 2018

Daily Security Briefing - Wednesday, March 28, 2018

Daily Security Briefing - Tuesday, March 27, 2018

Daily Security Briefing - Monday, March 26, 2018

Making Sense of Information Security Technologies: IDS/IPS, UTM, and SIEM

3 Reasons to Look at Managed SIEM Services

Daily Security Briefing - Friday, March 23, 2018

5 Things an IDS/IPS Can’t Do

Daily Security Briefing - Thursday, March 22, 2018

Daily Security Briefing - Wednesday, March 21, 2018

7 Signs You Should Invest In Security As A Service

Daily Security Briefing - Tuesday, March 20, 2018

Your Servers Have Been Memcached

How to Get a 24x7 SOC Team Without Hiring

Daily Security Briefing - Friday, March 16, 2018

Thinking About Security as a Service? 7 Reasons Why It's Time to Stop!

Daily Security Briefing - Thursday, March 15, 2018

Daily Security Briefing - Wednesday, March 14, 2018

Daily Security Briefing - Tuesday, March 13, 2018

Daily Security Briefing - Monday, March 12, 2018

Why Your Cyber Incident Response Matters

Daily Security Briefing - Friday, March 9, 2018

SEC Recommendations on Cybersecurity

Daily Security Briefing - Thursday, March 8, 2018

Daily Security Briefing - Wednesday, March 7, 2018

Daily Security Briefing - Tuesday, March 6, 2018

Daily Security Briefing - Monday, March 5, 2018

5 Things to Look for in a Security-as-a-Service Provider

Daily Security Briefing - Friday, March 2, 2018

Three Ways Indicators of Compromise Help SOC Teams

Daily Security Briefing - Thursday, March 1, 2018

Daily Security Briefing - Wednesday, February 28, 2018

Daily Security Briefing - Tuesday, February 27, 2018

Daily Security Briefing - Monday, February 26, 2018

Vulnerability and Patch Management Remains a Key Step in Cyber Defense

Daily Security Briefing - Friday, February 23, 2018

Defend Against Password Hacking

Daily Security Briefing - Thursday, February 22, 2018

Daily Security Briefing - Wednesday, February 21, 2018

Daily Security Briefing - Tuesday, February 20, 2018

The Value of Unified Vulnerability and Patch Management

Daily Security Briefing - Friday, February 16, 2018

5 Steps to Protect Against Ransomware

Daily Security Briefing - Thursday, February 15, 2018

New Vulnerability Announced. Now What?

Daily Security Briefing - Wednesday, February 14, 2018

Creating SIEM Alerts To Detect Attacks

Daily Security Briefing - Tuesday, February 13, 2018

A Step in the Right Direction

Technology: 1/3 of the Battle

Daily Security Briefing - Monday, February 12, 2018

Daily Security Briefing - Friday, February 9, 2018

T-Mobile Port Out Scam Highlights Weakness in SMS-based Multi-Factor Authentication

7 Questions to Ask When Prioritizing a Vulnerability

Daily Security Briefing - Thursday, February 8, 2018

Reducing Business Risk

Daily Security Briefing - Wednesday, February 7, 2018

Daily Security Briefing - Tuesday, February 6, 2018

Daily Security Briefing - Monday, February 5, 2018

Daily Security Briefing - Friday, February 2, 2018

Hackers Moving from Ransomware to Cryptomining Malware

Managing Patches In Mixed OS Environments

Most Recent Posts

Subscribe to Email Updates