Cygilant Blog

Employee Spotlight: Steve Harrington, Vice President of Marketing

Posted by Joseph Murphy on Feb 10, 2020

We recently welcomed veteran technology marketing executive, Steve Harrington, to the Cygilant team as vice president of marketing. Prior to joining Cygilant, Steve worked at Extreme Networks where he was vice president of marketing. I recently sat down with Steve to discuss his new role and decision to join the Cygilant team, and get to know him better as a person, including what makes him tick. Following is a transcript of our discussion.

Click here to view the formal announcement on Steve’s appointment and Cygilant’s new headquarters in Burlington, Mass.

Introducing the From The Phones Blog Series

Posted by Colin Shea on Feb 10, 2020

We are excited to announce our new Blog and Video series called, “From the Phones”.
There is nothing like hearing from the person who is on the phone, speaking with hundreds of customers every month. This is where the true rubber meets the road. The learnings that can be gained from tapping into this audience are tremendous. And, we are pleased to share that information with you.


We will be featuring several of our Cygilant team members as they discuss the challenges and issues that face Cybersecurity professionals in today’s ever-changing market. We hope you enjoy! 

Just Say No to the Latest Cybersecurity Tools, Say Yes to Security as a Service

Posted by Kevin Landt on Jun 10, 2019

 
As cyber attacks, alerts and patches increase and IT budgets and staff growth stay stagnant, how can you, an SMB IT security professional, keep up?
 

10 Reasons to Consider a Managed Security Service

Posted by Kevin Landt on Jun 10, 2019

There is no doubt that security monitoring is important regardless or company size or industry. According to the respected Verizon 2019 Data Breach Investigations Report, “…we don’t see any industries flying completely under the radar. …everyone is vulnerable to some type of event.” The question is how to implement an effective program. Many companies jump into a project without considering managed security monitoring as an alternative to an in-house SIEM deployment.

4 Questions You Need to Ask About Managed Detection and Response

Posted by Trevan Marden on Jul 23, 2018

Managed detection and response helps solve the needs of organizations who lack resources and enables organizations to better detect and respond to threats. MDR services complement an organization’s own IT or security team to help provide the extra eyes for 24x7 coverage along with security expertise and guidance for remediating potential security incidents that are detected. However, not all services provide the same features. So, it’s important to ask these four questions when looking at managed detection and response solutions.

Are Managed Security Services Right for You?

Posted by Trevan Marden on Jul 6, 2018

Are you considering augmenting your internal resources with managed security services? Can’t decide if managed security services are a good fit for you? Here are few things to think about when considering adding a managed security service.

Overcoming Cybersecurity Challenges with Managed Security Services

Posted by Trevan Marden on Jun 27, 2018

An article on SecurityWeek this week announced the results of the IDC Worldwide and U.S. Comprehensive Security Services Forecast, which showed that managed security services is the largest and fastest-growing of the segments they covered. The article points to two key drivers of this growth: growing complexity of Security Operations and an overwhelming volume of security incidents.

3 Ways Integrating Vulnerability and Patch Management Helps Protect Data

Posted by Trevan Marden on May 11, 2018

So often the cause of the major breaches we see in the news is failure by the organization to patch a software vulnerability for which a patch has long been available. Hackers know organizations often lag months or longer on installing available patches and they take advantage of these gaps in your security to gain access and cause harm. Oftentimes this lag is because the organizations do not have the time, resources, or technology needed to effectively identify vulnerabilities and implement the necessary remediation.

Automation Can’t Replace Role of People in Security

Posted by Trevan Marden on May 8, 2018

This week, an article on DarkReading served as a good reminder that technology alone can only take us so far in the fight against cyber threats. The role of trained security staff cannot be simply replaced by automation.

Top 5 Things to Look For In Your Next SIEM Solution

Posted by Lydia Dwyer on Apr 25, 2018

Whether you already have a SIEM in place that’s not providing value or you’re looking for your first SIEM solution, we’ve put together a list of five things you should be sure to look for in your next SIEM solution. All too often, organizations purchase expensive SIEM technology without considering all the aspects necessary to make the SIEM deployment successful. The technology alone will end up as shelfware if you don’t have the trained staff to deploy and manage the solution, and a 24x7 SOC team to monitor and respond to potential incidents. It’s also important to integrate the SIEM into your overall security program and have a thorough plan for how you will respond to incidents. The combination of people, process, and technology are the key to a successful SIEM implementation that will help your organization reduce risk, prevent data breaches, and be compliant. Here are five things to look for in your next SIEM solution:

Most Recent Posts

Subscribe to Email Updates