Cygilant Blog

Employee Spotlight: Steve Harrington, Vice President of Marketing

Posted by Joseph Murphy on Feb 10, 2020

We recently welcomed veteran technology marketing executive, Steve Harrington, to the Cygilant team as vice president of marketing. Prior to joining Cygilant, Steve worked at Extreme Networks where he was vice president of marketing. I recently sat down with Steve to discuss his new role and decision to join the Cygilant team, and get to know him better as a person, including what makes him tick. Following is a transcript of our discussion.

Click here to view the formal announcement on Steve’s appointment and Cygilant’s new headquarters in Burlington, Mass.

Should You Switch from SMS-based Two-factor Authentication to U2F Fobs?

Posted by Trevan Marden on Aug 1, 2018

The quick answer is probably yes, wherever you can.

Google recently announced that since deploying physical security fobs to all of its employees, none had been successfully phished on work-related accounts. Google also announced plans to introduce its own hardware fobs – the Titan Security Key, although they look suspiciously identical to those currently offered by Feitian. This may be the endorsement needed to force greater support for the U2F standard which employs a physical fob to generate authentication tokens as a second factor.

Proper Segregation of a Network

Posted by James Cote on Apr 5, 2018

Proper segregation of a network is one simple line of defense against malicious threats that is very effective. Even the latest security systems won’t always protect your network if it’s not properly set up and segregated into different role based sections. These different sections or VLANS are what help keep your network safe. When carved-out properly an attacker will have to traverse several roadblocks along the way.  The key to a properly segregated network is multiple areas with different permissions and roles for each area.  This will prevent an attacker who infiltrates the network in one area from obtaining information from another area.

TLS 1.3 is Faster and More Secure

Posted by Michael Napolitano on Apr 4, 2018

On March 21st, the IETF voted unanimously to approve the latest draft for TLS 1.3. Four years and 28 drafts in the making, TLS 1.3 boasts new standards to improve both security and speed of the TLS protocol.

Technology: 1/3 of the Battle

Posted by Mike Leonard on Feb 12, 2018

I spent the first few years of my career as a financial advisor and hated every day.  It was boring, slow paced, and confusing to customers.  Two words to describe asking grandma about her annuity over every holiday dinner: not fun.  So in 2012, I joined the fast-paced, ever-changing world of cybersecurity.  Over the past six years, I have held a number of sales roles, both in leadership and as an individual contributor.  I have found it – thankfully – to be the exact opposite of the finance world… except when it comes to the confusion in the market.

Cybersecurity a Key Topic at Davos this Week

Posted by Trevan Marden on Jan 26, 2018

This week, as the World Economic Forum (WEF) met in Davos, Switzerland, cybersecurity took a key spot on the agenda. The World Economic Forum announced plans Wednesday for a new Global Centre for Cybersecurity. “The new Global Centre for Cybersecurity is designed as the first platform to tackle today’s cyber risks in a truly global manner,” Alois Zwinggi, managing director for the WEF, told CyberScoop. The new group is intended to facilitate increased public-private collaboration and information sharing on cyber threats. “Only through collaboration, information exchange and common standards can the global community successfully counter organized digital crime,” said a press release from the organization.

MacOS Patch Management

Posted by Trevan Marden on Jan 18, 2018

We’re excited to announce that our patch support has been extended to MacOS. The Cygilant Patch Management service now covers Windows, Linux, Mac and applications like Adobe, Java, and the leading web browsers.

5 Open Source Tools to Automate and Secure Your Infrastructure

Posted by Lydia Dwyer on Dec 4, 2017

Many amazing open source tools have been developed and matured over the past couple of years that will help you both be more secure and make your job easier. We have picked five top open source tools that can automate and help secure your IT infrastructure, preparing your organization for future success and compliance.

Five Steps for an Effective Incident Response Plan

Posted by Trevan Marden on Dec 1, 2017

In today’s world of massive data breaches and constant cyberattacks, it’s important to stay vigilant and have a solid Incident Response Plan in place to identify and mitigate potential security incidents. Here are five important steps to have covered in your plan.

You Know You Need a Dedicated Cybersecurity Team, Now What?

Posted by Kevin Landt on Nov 29, 2017

Are you looking to take your cybersecurity program to the next level? One of the most important steps in maturing your security program is moving to a dedicated team responsible for managing cyber risk.

Many organizations try to get by with someone on the IT team wearing the security hat. However, most recognize that this is only a temporary stage that will need to be addressed for several reasons:

Most Recent Posts

Subscribe to Email Updates