Cygilant Cybersecurity Blog

Learn how a cybersecurity service can help improve your security posture.

Cybersecurity Experts Discuss: Process, Process, Process

In our next post featuring Ben Harrison, Director SOC and Security Services at Cygilant and Jake McCabe, CISSP, Presales...


( read )

Tags: Security Monitoring, SOC as a Service

Cybersecurity Experts Discuss: Plan Your Use Cases

In our fourth post featuring Ben Harrison, Director SOC and Security Services at Cygilant and Jake McCabe, CISSP, Presales...


( read )

Tags: Security Monitoring, SOC as a Service

Cybersecurity Experts Discuss: Frameworks & MITRE ATT&CK

Ben Harrison, Director SOC and Security Services, Cygilant and Jake McCabe, CISSP, Presales Director, LogPoint continue their...


( read )

Tags: Security Monitoring, SOC as a Service

Cybersecurity Experts Discuss: Demonstrable Customer Security Value

Demonstrable.

Customer.

Security.

Value.

 


( read )

Tags: Security Monitoring, SOC as a Service

Cybersecurity Experts Discuss: Doing the Basics Well

In a series of blogs, we cover why a modern SIEM and SOC are essential in fighting today's cyber threats. Here is a summary...


( read )

Tags: Security Monitoring, SOC as a Service

Happy National Cybersecurity Awareness Month

Happy October! Did you know that October is National Cybersecurity Awareness Month (NCSAM)? In fact, this is the 17th year...


( read )

Tags: Cybersecurity-as-a-Service

Affordable SOC-as-a-Service for SMEs

You may think that a Security Operations Center (SOC) is only for very large companies, but the reality is that malicious...


( read )

Tags: SOC as a Service

College Improves Security Posture with Cygilant Cybersecurity-as-a-Service

With back to school upon us for universities, colleges and K-12, and unprecedented IT challenges, today we feature one college...


( read )

Tags: Cybersecurity-as-a-Service

5 Reasons to Work with Cygilant

We all know that it’s hard to navigate the cybersecurity space. From tooling to services, recruiting to resource limitations,...


( read )

Tags: Cybersecurity-as-a-Service