Request a Demo
Welcome to the Cygilant Blog

Thanks, Facebook

Posted by Joseph Murphy on Apr 17, 2018

If you watched Zuck testify in Congress in early April 2018, you could feel the nation’s mindset around security and data privacy shifting in a positive direction. The people not in the security community learned that even when they think they’re protecting their data, they’re not. They might be asking themselves, what can I do to protect my data online? Delete my Facebook? Throw my cell phone into the abyss? Close my bank account? Then, you realize, we’d be lost without these life lines.

You Have a Vulnerability Scanner. Now What?

Posted by Trevan Marden on Mar 30, 2018

One of the best ways to reduce risk quickly is to identify and remediate vulnerabilities across your network devices. And a vulnerability scanner can be a terrific way to seek out vulnerabilities lurking in your infrastructure. But how do you create a plan to scan your network devices regularly as new vulnerabilities continue to emerge, and what do you do with the scan results? A vulnerability scanner can be a great tool when you take the time to use it to its fullest. But all too often this type of software goes unused or underused because time isn’t easy to come by in most security organizations. 

Your Servers Have Been Memcached

Posted by Michael Napolitano and Jacob Cardinal on Mar 19, 2018

If you’ve been paying attention to cybersecurity, it’s very likely you’ve seen news regarding Github’s survival of the largest DDOS attack recorded in history. Clocking in at 1.3 TBPS (terabytes per second) it’s impressive that their network didn’t tank. This is in part due to the services of Akamai who was able to successfully proxy and scrub the network traffic.

Vulnerability and Patch Management Remains a Key Step in Cyber Defense

Posted by Trevan Marden on Feb 23, 2018

With the Center for Internet Security (CIS) set to launch version 7 of the CIS Controls (formerly the SANS Critical Security Controls) this March 19th, it’s a great time to review your cybersecurity posture and make sure you’re keeping pace.  The latest update is expected to make minor changes that reflect the changing security landscape. While prioritization of the controls may change, it’s unlikely that many of the core controls will change substantively.

The Value of Unified Vulnerability and Patch Management

Posted by Trevan Marden on Feb 16, 2018

This week, Cygilant announced its latest service available via the SOCVue Security Operations and Analytics Platform – Unified Vulnerability and Patch Management. Why is this unique and why is it important?

Managing Patches In Mixed OS Environments

Posted by Kevin Landt on Feb 1, 2018

Have all of your Mac users installed the MacOS 10.13.2 patch to fix the Spectre and Meltdown vulnerabilities? Do you have an easy way to find out? How about proof to show an auditor?

MacOS Patch Management

Posted by Trevan Marden on Jan 18, 2018

We’re excited to announce that our patch support has been extended to MacOS. The Cygilant Patch Management service now covers Windows, Linux, Mac and applications like Adobe, Java, and the leading web browsers.

Why are Cybersecurity Programs Thankful for SIEM and Patch Management?

Posted by Neil Weitzel on Nov 27, 2017

As you are coming back from the Thanksgiving weekend and looking forward to the holiday season with friends and family we wanted to take a moment to explain what we are thankful for at Cygilant. 

As many know, security information and event management (SIEM); the part of a cybersecurity program that analyzes real-time events and alerts triggered by software or devices has been around quite some time.  At Cygilant we have spent over a decade building a platform for analyzing SIEM data.  It was not an easy task. As many in the security industry know, working with SIEM data is no small undertaking. So, to say we are very thankful for vendors and technologists that continue to develop and support SIEM is an understatement.

You're protected against ransomware, right?

Posted by Neil Weitzel on Oct 28, 2017

The first and most important action is to educate users of the systems.  Most ransomware and cyber-attacks, in general, rely on a user taking an unintended action; commonly a user executes a seemingly normal but nefarious file.  Because of this attack vector users should be wary of unsolicited emails, especially ones with attachments and links.  To take this one step further users should know what types of files and operations commonly make changes to their systems. This will help them understand when changes are normal or something out of the ordinary is attempting to make changes. To name a few, for example, users of windows machines might want to investigate exe, msi, bat, or ps1 file types prior to executing them.

Five Critical Requirements for Securing for the Internet of Things

Posted by John Linkous on Aug 14, 2017

As regular readers of the EiQ blog know, we’re suspicious of the Internet of Things (IoT), the massive collection of Internet-connected devices that don’t fall into the traditional “computer” category.  From “smart” energy meters, to in-car technology, to Internet-connected home appliances, the IoT is an incredibly broad spectrum of technologies that can gain value – in some cases, significant value, in other cases, more dubious – by connecting to other devices and networks.

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All