SOCVue ROI Calculator
Welcome to the Cygilant Blog

MacOS Patch Management

Posted by Trevan Marden on Jan 18, 2018

We’re excited to announce that our patch support has been extended to MacOS. The Cygilant Patch Management service now covers Windows, Linux, Mac and applications like Adobe, Java, and the leading web browsers.

You Know You Need a Dedicated Cybersecurity Team, Now What?

Posted by Kevin Landt on Nov 29, 2017

Are you looking to take your cybersecurity program to the next level? One of the most important steps in maturing your security program is moving to a dedicated team responsible for managing cyber risk.

Many organizations try to get by with someone on the IT team wearing the security hat. However, most recognize that this is only a temporary stage that will need to be addressed for several reasons:

Top 3 Reasons to Outsource Your IT Security

Posted by Security Steve on Dec 21, 2016

Can an outside company help your organization's security infrastructure?

Many business leaders feel as if IT security should be a service that's kept in-house. While it's true that internal employees do need to be able to take steps to ensure the safety of company data, there are a host of advantages to allowing an experienced outside company to take the reins. 

So, what can your organization get out of outsourcing IT security? 

1. Your team may not be experienced enough

Although your IT employees are obviously very talented individuals, there's a good chance that cybersecurity isn't their main focus. While these workers surely know a good deal about this topic, it may not be enough to stop an impending cyberattack. 

Cybersecurity in Q2: 2016 is Shaping Up to be the Biggest Year Yet

Posted by Shawn O'Brien on May 5, 2016


As the second quarter of 2016 continues, it is increasingly clear that SMEs are faced with an urgent need to secure their IT systems. The year isn't even halfway through and already organizations have seen sophisticated cyber attacks that outstrip those faced in the past. Combating such threats means IT personnel must be sufficiently knowledgeable and qualified, but often companies do not have the resources necessary to hire enough in-house IT staff. Given this challenge, many firms are turning to managed security services to improve their cyber defenses.

Solving the Cyber Security Skills Shortage

Posted by Trevan Marden on May 3, 2016


If you’re involved in information security, you’ve probably noticed that there’s a high demand for the limited number of talented security staff available in the market. Cisco has stated that they estimate the shortage at over 1 million unfilled security jobs worldwide. In a brief published in February, research firm, Enterprise Strategy Group (ESG), concludes, “nearly half of organizations now claim to have a problematic shortage of cybersecurity skills.” Finding and retaining qualified security professionals can be a challenge for any organization, but may be particularly hard for mid-market organizations who often lack the resources to attract top talent.

Choosing the Right Security Partner for 2016

Posted by Robert Porzio on Dec 23, 2015

The cyber threat landscape is an ever-changing phenomena, as organized groups of cyber criminals and nation-sponsored hackers with far-reaching resources and knowledge wreak havoc. This evolved cyber landscape has left mid-market organizations, those with small (if any) IT departments, having to field constant threats with limited in-house resources, often unsuccessfully. In fact, 71% of cyber-attacks are targeted at organizations with fewer than 100 employees.

Savings vs. Security: The Costs of Sacrificing Cybersecurity

Posted by Security Steve on Nov 30, 2015

Coerced by the pressures of competition, businesses have to carefully weigh the value of every minute and every expense, seeking to maximize productivity and minimize expenses. In such a stressful environment, it can be easy to disregard the necessity of cybersecurity. If a company has not suffered a data breach in the past, it may not encounter one in the future—or so the thinking goes. But when security is sacrificed, any gains are likely to be short-lived, leading to serious consequences.

The Illusion of Speed

Cybersecurity takes time to put in place. Hiring an auditing team, for example, to evaluate all of the risks your company faces means you must schedule precious time to meet with the auditors, to decide what to do about their recommendations, and then implement them. It’s understandably easier to forget such tasks in favor of the familiar challenges of regular work.

How Cyberwarfare is Becoming More Sinister and Elaborate

Posted by Vijay Basani on Sep 17, 2015

If we accept a definition that includes destruction as its primary element—of lives, materials or infrastructure—there has been very little, if anything, that could truly be called “cyberwarfare,” despite how frequently the term gets bandied about in the media.

5 Lessons to Learn from the MLB Hacks

Posted by Security Steve on Sep 15, 2015


Most of the eyes on a hack are on the victims, and on those who perhaps did not do what was needful to avoid it. The attackers tend to assume the silhouettes of generic bad guys of one species or another.

So when a hack comes from a Major League Baseball team, it gathers national, even international, attention and that attention is on the perpetrators.

How Personal Does the Data Need to Be – Part Two

Posted by Security Steve on Sep 11, 2015

Yep, we called it, didn’t we? Earlier this summer, we wrote about “data breach fatigue” and how with the growing incidences of data breaches, consumers have become numb to reports that their credit cards and other personal information have been compromised.

Subscribe to Email Updates

How Much Could You Save?

Find out now with our
60-second ROI calculator!


Most Popular Posts

Posts by Topic

See All