Request a Demo
Welcome to the Cygilant Blog

Lydia Dwyer

Recent Posts

8 Important Factors to Look for in a SOC as a Service Provider

Posted by Lydia Dwyer on Mar 11, 2019

When sourcing SOC as a service, it's important to know what you should expect from the provider. Discover 8 important factors to look for when choosing a SOC as a service provider.

Almost half of CIOs said cybersecurity was a top concern for their organizations in 2018. As threats continue to evolve, it’s unlikely this concern is going to go away in 2019 or beyond.

FFIEC Data Encryption Standards: What You Need to Know!

Posted by Lydia Dwyer on Feb 26, 2019

 

Want to make sure your company is Federal Financial Institutions Examination Council (FFIEC) compliant? Then check out this guide to FFIEC data encryption standards, describing how you can ensure your organization complies with the FFIEC's encryption requirements.

Cybersecurity standards set the minimum requirements to protect your business systems and data. Complying with government and industry data security standards can cost a business millions – and the costs have been increasing in recent years. Concerns about technology and data security are also on the rise, which in turn has led to new rules and new regulations.

Top 5 Things to Look For In Your Next SIEM Solution

Posted by Lydia Dwyer on Apr 25, 2018

Whether you already have a SIEM in place that’s not providing value or you’re looking for your first SIEM solution, we’ve put together a list of five things you should be sure to look for in your next SIEM solution. All too often, organizations purchase expensive SIEM technology without considering all the aspects necessary to make the SIEM deployment successful. The technology alone will end up as shelfware if you don’t have the trained staff to deploy and manage the solution, and a 24x7 SOC team to monitor and respond to potential incidents. It’s also important to integrate the SIEM into your overall security program and have a thorough plan for how you will respond to incidents. The combination of people, process, and technology are the key to a successful SIEM implementation that will help your organization reduce risk, prevent data breaches, and be compliant. Here are five things to look for in your next SIEM solution:

5 Things an IDS/IPS Can’t Do

Posted by Lydia Dwyer on Mar 22, 2018

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) have been touted as the cure-all to security and compliance woes. The most common type of system sits on the network and inspects all inbound packets. An IDS/IPS is designed to inspect incoming packets to see if they are part of a malicious attack and drop or alert on the packets which are. But like most technologies, IDS/IPS has numerous limitations and pitfalls that vendors of these systems don’t want you to know. When considering how best to protect your organization’s network and an IDS/IPS is in the running, you should consider the following five key limitations.

7 Questions to Ask When Prioritizing a Vulnerability

Posted by Lydia Dwyer on Feb 8, 2018

Vulnerability Management is a tough but essential part of business risk management. It is an ongoing process to assess and manage risk to a business or organization’s digital infrastructure and assets.

5 Great Open Source Tools to Automate and Secure Your Infrastructure

Posted by Lydia Dwyer on Dec 4, 2017

With 2018 approaching fast, you will be thinking about your IT and security projects for the next year. Many amazing open source tools have been developed and matured over the past couple of years that will help you both be more secure and make your job easier. We have picked five top open source tools that can automate and help secure your IT infrastructure, preparing your organization for future success and compliance.

The 3 Secrets of Better Security Ticket Management

Posted by Lydia Dwyer on Aug 3, 2017

Love them and hate them, tickets are an essential task management tool in tech industry. For many IT professionals ticket management can feel a bit like trying to defeat the Hydra; close one ticket and three more replace it.

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All