Cygilant Blog

5 Open Source Tools to Automate and Secure Your Infrastructure

Posted by Lydia Dwyer on Dec 4, 2017

Many amazing open source tools have been developed and matured over the past couple of years that will help you both be more secure and make your job easier. We have picked five top open source tools that can automate and help secure your IT infrastructure, preparing your organization for future success and compliance.

Top 3 Reasons to Outsource Your IT Security

Posted by Security Steve on Dec 21, 2016

Can an outside company help your organization's security infrastructure?

Many business leaders feel as if IT security should be a service that's kept in-house. While it's true that internal employees do need to be able to take steps to ensure the safety of company data, there are a host of advantages to allowing an experienced outside company to take the reins. 

So, what can your organization get out of outsourcing IT security? 

1. Your team may not be experienced enough

Although your IT employees are obviously very talented individuals, there's a good chance that cybersecurity isn't their main focus. While these workers surely know a good deal about this topic, it may not be enough to stop an impending cyberattack. 

Why It's Difficult For An IT Team to Monitor Cyber Threats

Posted by Security Steve on Nov 21, 2016

It's not easy to protect corporate computers from cyber attacks.

When you're trying to protect your home computer from cyber threats, what do you normally do? You probably download the latest malware program and update your firewall.

But IT security at the corporate level is much more complicated, costly and time consuming.

"IT security at the corporate level is complicated, costly and time consuming."

After all, if it was easy to protect systems, IT criminals wouldn't have gained access to the Trump Hotel Collection and stolen credit card information from 70,000 individuals. The Australian Red Cross wouldn't have faced a cyber breach that resulted in hackers gaining access to 550,000 blood donors' personal information. And Anthem health insurance systems wouldn't have had to deal with the fall out of a breach that exposed the personal information of nearly 80 million people.

3 Global Cybersecurity Standards Every Professional Should Know

Posted by Kevin Landt on Aug 16, 2016


Cybersecurity standards are sets of best practices for protecting organizations from cyber attacks. There are many groups across the world that establish and promulgate their recommended cybersecurity standards. These range from nondecision-making bodies of experts sharing information to treaty-based governmental associations.


The various frameworks each have their own advantages and disadvantages. Starting with the familiar U.S. federal government's approach and then moving on to other standards around the globe, the following introduces three cybersecurity standards or approaches to standards and why they matter for small- to medium-sized businesses.

In Charge of Your Company’s Cybersecurity? 3 Tips to Handle That Responsibility

Posted by Vijay Basani on Aug 4, 2016

CISOs (Chief Information Security Officers) or others who are in charge of a company's cybersecurity face a huge responsibility: they have to keep their firms' IT assets safe not just from malicious insiders and accidental leaks, but also from every hacker around the globe—at a time when more hacking scandals happen all the time.


EiQ has previously discussed the technical, interpersonal, and leadership skills required for CISOs to meet this challenge, and today we add three tips they can follow in order to perform at their best and manage the responsibility of their role.

Is Remote Access Worth the Cybersecurity Risk? Assessing TeamViewer's Breach

Posted by Security Steve on Jul 22, 2016


Telecommuting has never been more common, and as it increases in prevalence, cybersecurity risks will follow. This has been most recently illustrated by the complications plaguing TeamViewer, a popular proprietary piece of software for establishing remote access between computers.

How to Build a Successful Information Security Program Regardless of the Talent Shortage

Posted by Security Steve on Jul 18, 2016


As the field of cybersecurity explodes, it becomes harder for corporations to attract the talent they need. To make matters worse, there's a shortage of qualified cybersecurity professionals. According to an ESG research report, 44% of organizations are short-staffed in cybersecurity, and an ISACA study found that 35% have open cybersecurity positions they're unable to fill. In this challenging hiring market, how can you attract the talent you need to stay safe?

Here Are the Skills You Need to Be a Chief Information Security Officer

Posted by Vijay Basani on Jun 29, 2016


The position of Chief Information Security Officer (CISO) is a crucial one within an organization, as the role calls for "superhero"-like responsibilities. CISOs are the executives responsible for stopping the thousands of hackers who may be out there attempting to breach businesses around the clock. To accomplish this challenging work, CISOs will be best equipped if they bring the following three types of skills to the job.

6 Videos Every Cybersecurity Professional Needs to Watch

Posted by Security Steve on Jun 2, 2016


In an industry that's constantly evolving, it can be a challenge to stay on top of recent trends. Following cybersecurity news sites and blogs can help educate you about current happenings, but what about the bigger picture? We've rounded up six online videos that cybersecurity professionals should watch in order to become better informed about today's most pressing cybersecurity issues.

Solving the Cyber Security Skills Shortage

Posted by Trevan Marden on May 3, 2016


If you’re involved in information security, you’ve probably noticed that there’s a high demand for the limited number of talented security staff available in the market. Cisco has stated that they estimate the shortage at over 1 million unfilled security jobs worldwide. In a brief published in February, research firm, Enterprise Strategy Group (ESG), concludes, “nearly half of organizations now claim to have a problematic shortage of cybersecurity skills.” Finding and retaining qualified security professionals can be a challenge for any organization, but may be particularly hard for mid-market organizations who often lack the resources to attract top talent.

Most Recent Posts

Subscribe to Email Updates