Request a Demo
Welcome to the Cygilant Blog

5 Steps to Effective Threat Detection

Posted by Trevan Marden on Apr 13, 2018

Cyber attacks are waged against organizations of all sizes and industries. It is more critical than ever that these organizations find ways to effectively detect and mitigate threats. For organizations looking to build out their threat detection capabilities and avoid disaster, here are 5 steps to effective threat detection:

The Disconnect Between CIO, IT Manager, and Security Engineer

Posted by Chris Durocher on Apr 2, 2018

I’ve spent the past few years calling into CIOs, IT Managers, or Security Engineers discussing where their security program is today and what they would like it transformed too. Even though you probably dread the sight of an unknown number, my favorite part of my position is being a facilitator of conversation as well as understanding the focus of all parties involved. What I’ve come to realize is the disconnect that often exists within the security team and the individual goals differ position to position.

Why Your Cyber Incident Response Matters

Posted by Trevan Marden on Mar 9, 2018

Cyber attacks frequently target personal and business data and it is critical to respond quickly to minimize the damage should a breach occur. Cyber incident responseincludes those plans and activities undertaken to identify, investigate, remediate, and assess damage and prevent further damage. It’s important for organizations to have a well-thought-out cyber incident response plan that includes detailed blueprints of the activities and owners for how your organization will respond to a security incident.

New Vulnerability Announced. Now What?

Posted by Miguel De Los Santos on Feb 14, 2018

Imagine this scenario: It's Monday morning. As far as Mondays go, this looks to be a relatively light day. No changes were made over the weekend, so you do not anticipate any fires to put out. All you have to focus on are a couple meetings later this morning. Before those meetings begin, you check your favorite tech outlet (we recommend Cygilant Daily Security Briefing),  and realize that a major vendor has announced a critical vulnerability. This vulnerability could potentially be on every node across your network. One executive finds out about this issue shortly after. He or she now needs to know where the company stands.

Technology: 1/3 of the Battle

Posted by Mike Leonard on Feb 12, 2018

I spent the first few years of my career as a financial advisor and hated every day.  It was boring, slow paced, and confusing to customers.  Two words to describe asking grandma about her annuity over every holiday dinner: not fun.  So in 2012, I joined the fast-paced, ever-changing world of cybersecurity.  Over the past six years, I have held a number of sales roles, both in leadership and as an individual contributor.  I have found it – thankfully – to be the exact opposite of the finance world… except when it comes to the confusion in the market.

Reducing Business Risk

Posted by Miguel De Los Santos on Feb 7, 2018

Keeping the scale in your favor during an average production day always proves to be difficult. The list of vulnerabilities has grown unmanageable.  In many cases, there are lengthy reports to review, spreadsheets to update, and worsePDFs to comb through. Meanwhile, threat actors continue to develop zero-day vulnerabilities along with weaponizing known vulnerabilities; some of which go as far back as 2006.  

Five Steps for an Effective Incident Response Plan

Posted by Trevan Marden on Dec 1, 2017

In today’s world of massive data breaches and constant cyberattacks, it’s important to stay vigilant and have a solid Incident Response Plan in place to identify and mitigate potential security incidents. Here are five important steps to have covered in your plan.

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All