Request a Demo
Welcome to the Cygilant Blog

5 Things an IDS/IPS Can’t Do

Posted by Lydia Dwyer on Mar 22, 2018

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) have been touted as the cure-all to security and compliance woes. The most common type of system sits on the network and inspects all inbound packets. An IDS/IPS is designed to inspect incoming packets to see if they are part of a malicious attack and drop or alert on the packets which are. But like most technologies, IDS/IPS has numerous limitations and pitfalls that vendors of these systems don’t want you to know. When considering how best to protect your organization’s network and an IDS/IPS is in the running, you should consider the following five key limitations.

Thinking About Security as a Service? 7 Reasons Why It's Time to Stop!

Posted by Kevin Landt on Mar 15, 2018

Have you been thinking about using Security as a Service to supplement your team? If any of the statements below apply to your company, it’s time to stop thinking about it and start a new approach that incorporates Security as a Service into your operations.

5 Things to Look for in a Security-as-a-Service Provider

Posted by Trevan Marden on Mar 2, 2018

Information security is becoming a competitive advantage in many industries, with companies that can be trusted with financial data and personal information becoming better able to attract and retain customers and partners. Security as a service allows resource-constrained organizations to keep a level playing field with larger enterprises. Instead of a large upfront fixed cost for software such as SIEM, personnel hiring and professional integration services, security as a service spreads those costs over the subscription period. This model can provide more flexibility when budgeting IT expenditures. The scarcity of trained security professionals makes hiring trained staff in-house difficult. With security as a service, you can often receive around-the-clock security coverage for less than the cost of staffing one shift in-house.

MacOS Patch Management

Posted by Trevan Marden on Jan 18, 2018

We’re excited to announce that our patch support has been extended to MacOS. The Cygilant Patch Management service now covers Windows, Linux, Mac and applications like Adobe, Java, and the leading web browsers.

You Know You Need a Dedicated Cybersecurity Team, Now What?

Posted by Kevin Landt on Nov 29, 2017

Are you looking to take your cybersecurity program to the next level? One of the most important steps in maturing your security program is moving to a dedicated team responsible for managing cyber risk.

Many organizations try to get by with someone on the IT team wearing the security hat. However, most recognize that this is only a temporary stage that will need to be addressed for several reasons:

Top 3 Reasons to Outsource Your IT Security

Posted by Security Steve on Dec 21, 2016


Can an outside company help your organization's security infrastructure?

Many business leaders feel as if IT security should be a service that's kept in-house. While it's true that internal employees do need to be able to take steps to ensure the safety of company data, there are a host of advantages to allowing an experienced outside company to take the reins. 

So, what can your organization get out of outsourcing IT security? 

1. Your team may not be experienced enough

Although your IT employees are obviously very talented individuals, there's a good chance that cybersecurity isn't their main focus. While these workers surely know a good deal about this topic, it may not be enough to stop an impending cyberattack. 

Cybersecurity in Q2: 2016 is Shaping Up to be the Biggest Year Yet

Posted by Shawn O'Brien on May 5, 2016

 

As the second quarter of 2016 continues, it is increasingly clear that SMEs are faced with an urgent need to secure their IT systems. The year isn't even halfway through and already organizations have seen sophisticated cyber attacks that outstrip those faced in the past. Combating such threats means IT personnel must be sufficiently knowledgeable and qualified, but often companies do not have the resources necessary to hire enough in-house IT staff. Given this challenge, many firms are turning to managed security services to improve their cyber defenses.

Solving the Cyber Security Skills Shortage

Posted by Trevan Marden on May 3, 2016

 

If you’re involved in information security, you’ve probably noticed that there’s a high demand for the limited number of talented security staff available in the market. Cisco has stated that they estimate the shortage at over 1 million unfilled security jobs worldwide. In a brief published in February, research firm, Enterprise Strategy Group (ESG), concludes, “nearly half of organizations now claim to have a problematic shortage of cybersecurity skills.” Finding and retaining qualified security professionals can be a challenge for any organization, but may be particularly hard for mid-market organizations who often lack the resources to attract top talent.

Choosing the Right Security Partner for 2016

Posted by Robert Porzio on Dec 23, 2015

The cyber threat landscape is an ever-changing phenomena, as organized groups of cyber criminals and nation-sponsored hackers with far-reaching resources and knowledge wreak havoc. This evolved cyber landscape has left mid-market organizations, those with small (if any) IT departments, having to field constant threats with limited in-house resources, often unsuccessfully. In fact, 71% of cyber-attacks are targeted at organizations with fewer than 100 employees.

Savings vs. Security: The Costs of Sacrificing Cybersecurity

Posted by Security Steve on Nov 30, 2015

Coerced by the pressures of competition, businesses have to carefully weigh the value of every minute and every expense, seeking to maximize productivity and minimize expenses. In such a stressful environment, it can be easy to disregard the necessity of cybersecurity. If a company has not suffered a data breach in the past, it may not encounter one in the future—or so the thinking goes. But when security is sacrificed, any gains are likely to be short-lived, leading to serious consequences.

The Illusion of Speed

Cybersecurity takes time to put in place. Hiring an auditing team, for example, to evaluate all of the risks your company faces means you must schedule precious time to meet with the auditors, to decide what to do about their recommendations, and then implement them. It’s understandably easier to forget such tasks in favor of the familiar challenges of regular work.

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All