In our fourth post featuring Ben Harrison, Director SOC and Security Services at Cygilant and Jake McCabe, CISSP, Presales Director at LogPoint, we summarize why you need to plan your cybersecurity use cases.
Ben Harrison, Director SOC and Security Services, Cygilant and Jake McCabe, CISSP, Presales Director, LogPoint continue their discussion on modern SOC and SIEM by discussing frameworks.
There are many cybersecurity frameworks examples, including NIST and ISO 27001, which provide a roadmap for organizations to protect themselves and their customers. The majority of these frameworks include SIEM, log management, and security detection.
Happy October! Did you know that October is National Cybersecurity Awareness Month (NCSAM)? In fact, this is the 17th year that the Cybersecurity and Infrastructure Agency (CISA) and the National Cybersecurity Alliance (NCSA) have joined forces to help raise awareness about the importance of cybersecurity to businesses.
From time-to-time on this blog we like to take a moment to connect with those folks on the front lines of the cybersecurity battle, to give you a direct look into the issues they’re facing every day. Today, we sat down (virtually) with Sherry Horeanopoulos, the Information Security Officer at Fitchburg State University.
The COVID-19 pandemic is quickly changing the cybersecurity landscape. One example is the increase in cybersecurity incidents stemming from shadow IT as workers eagerly introduce new technologies and software apps to support their work from home (WFH) environments. Another effect of the pandemic is a rise in attacks against small and medium-sized enterprises (SMEs) as cybercriminals seek to capitalize on resource-constrained businesses.
We all know that it’s hard to navigate the cybersecurity space. From tooling to services, recruiting to resource limitations, it poses many obstacles before you can even begin to combat cyber threats. With that said, if you have identified that you need help, cybersecurity-as-a-service is a great option. It allows you to overcome recruiting challenges, resource constraints and provides help on the tools you need to manage, detect and respond to cyber threats.