SOCVue ROI Calculator
Welcome to the Cygilant Blog

Kevin Landt

Recent Posts

Thinking About Security as a Service? 7 Reasons Why It's Time to Stop!

Posted by Kevin Landt on Mar 15, 2018

Have you been thinking about using Security as a Service to supplement your team? If any of the statements below apply to your company, it’s time to stop thinking about it and start a new approach that incorporates Security as a Service into your operations.

Three Ways Indicators of Compromise Help SOC Teams

Posted by Kevin Landt on Mar 1, 2018

Threat Intelligence plays a major role in the modern Security Operations Center (SOC). This threat data can help analysts to detect security incidents earlier, take more informed actions, and implement security controls to defend against known threats.

Threat Intelligence includes context about threat actors, their intentions and their methods. It also includes Indicators of Compromise (IOC’s), which include IP addresses, domain names, URLs, file hashes, and more, that are known to be malicious. If one of these blacklisted items shows up in your event logs, it’s a good indicator that your network has been compromised.

Defend Against Password Hacking

Posted by Kevin Landt on Feb 22, 2018

Last year the Verizon Data Breach Investigation Report found that “81% of hacking-related breaches leveraged either stolen and/or weak passwords.” This shouldn’t come as a surprise. Companies have been investing in perimeter defenses for years. The best way for hackers to circumvent these network controls is to use legitimate credentials to authenticate themselves. Protecting against these attacks is a challenge, but there are several things your organization can do to reduce your risk.

Managing Patches In Mixed OS Environments

Posted by Kevin Landt on Feb 1, 2018

Have all of your Mac users installed the MacOS 10.13.2 patch to fix the Spectre and Meltdown vulnerabilities? Do you have an easy way to find out? How about proof to show an auditor?

You Know You Need a Dedicated Cybersecurity Team, Now What?

Posted by Kevin Landt on Nov 29, 2017

Are you looking to take your cybersecurity program to the next level? One of the most important steps in maturing your security program is moving to a dedicated team responsible for managing cyber risk.

Many organizations try to get by with someone on the IT team wearing the security hat. However, most recognize that this is only a temporary stage that will need to be addressed for several reasons:

MDR vs. MSSP vs. Security as a Service

Posted by Kevin Landt on Jul 17, 2017

Managed Detection & Response, or MDR, has been generating some buzz in the security industry. Last year, Gartner created a separate category for MDR and started selling research papers. Vendors took notice and started marketing their services as MDR offerings. What does all of this mean to you?

Effective Methods to Reduce Uncertainty Over Cyber Threats

Posted by Kevin Landt on Nov 22, 2016

If you're concerned about IT security threats, you should take measures to protect your company.

Are you worrying about an IT breach more than your company's sales numbers? In some sense, that's a good thing (IT security should be at the top of your list). But on the flip side, it shouldn't be keeping your organization's C-Suite executives up at night.

If IT security problems are becoming a headache, you probably need to do more to protect your company from cyber attacks.

Here are two effective methods to help you reduce your uncertainty about cyber threats.

3 Things About Cybersecurity Your Boss Wants to Know

Posted by Kevin Landt on Oct 25, 2016

Are CEOs aware of cybersecurity best practices? They should be.

Managers are versatile employees who understand how to run departments and motivate employees, but they may not always be the most well informed about cybersecurity. However, this isn't their fault!


The landscape of cybersecurity changes every day, and IT professionals must always stay on their toes to protect networks against new, advanced phishing and malware attacks. After all, cybercriminals are always on the lookout for new holes and weakness to exploit. Department managers simply don't have the time to run teams and IT security practices. 


IT professionals need to keep management well informed about new IT security protocols, updates, possible breaches, and actual attacks. In more detail, here are three things your boss wants to (or should know) about cybersecurity:

3 Signs You Should Invest in Cybersecurity

Posted by Kevin Landt on Oct 6, 2016

Cybercriminals and IT security shouldn't be taken lightly. One breach can cost your company hundreds of thousands of dollars. If you're not sure whether your company needs to upgrade or completely revamp its cybersecurity practices, here are three warning signs that indicate it should:


"One breach can cost your company hundreds or thousands of dollars."

1. You Don't Understand the Target

IBM executive security advisor Diana Kelley, who co-authored the IBM study "Securing the C-suite," has over two decades of cybersecurity experience. Her company has 7,000 IT professionals protecting the organization from outside threats. But even Kelley recognizes that numerous executives, even at the most influential computer institutions such as IBM, don't take IT security as seriously as they should.

Best Practices: Security Monitoring for Credit Unions

Posted by Kevin Landt on Sep 22, 2016

Credit unions must always be on the lookout for potential breaches.

The threat from cybercriminals is real, and credit unions must be on the constant lookout for potential breaches. These institutions are very vulnerable to cyber attacks because of their smaller size, and don't always have the IT infrastructure and resources to thwart cyber attacks like their larger counterparts, according to a new 2016 Beazley Breach Response Insights report.


"You're being tested every day, whether you realize it or not," said David Luchtel, Vice President of IT Infrastructure and Operations at WSECU, according to Credit Union Times.

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Evaluate Cygilant Services at no cost during the trial period.

SOCVue Free Trial

Most Popular Posts

Posts by Topic

See All