Cygilant Blog

How to Use the Microsoft Secure Score – A Step by Step Guide

Posted by Justin Quinn on Feb 12, 2019

Microsoft Security Score is a free security tool that every organization can use to better understand and improve its security position against today’s advanced threats.

In this blog, I’ll provide a step-by-step guide on how to use, and get the most out of, this free tool to improve your organization’s security posture.

Managed SOC: A Beginner's Guide to a Security Operations Center

Posted by Justin Quinn on Jan 9, 2019

SOC as a service is now a fully realized and effective way to protect SMBs from a cyber attack.

Keep reading to find out how you can benefit from SOC-as-a-Service.

Three Ways Indicators of Compromise Help SOC Teams

Posted by Kevin Landt on Mar 1, 2018

Threat Intelligence plays a major role in the modern Security Operations Center (SOC). This threat data can help analysts to detect security incidents earlier, take more informed actions, and implement security controls to defend against known threats.

Threat Intelligence includes context about threat actors, their intentions and their methods. It also includes Indicators of Compromise (IOC’s), which include IP addresses, domain names, URLs, file hashes, and more, that are known to be malicious. If one of these blacklisted items shows up in your event logs, it’s a good indicator that your network has been compromised.

Cybersecurity in 2016: Work Together Or Die Alone

Posted by Shawn O'Brien on Mar 31, 2016


Recently EiQ wrote about executive teams' perspective on cybersecurity and how organizations should collaborate, both internally and externally, to defend against cyber attacks. There is a serious need for companies to increase collaboration on cybersecurity and share critical information about vulnerabilities in order to prevent future hacks.

New Year’s Resolutions: A 2016 Security Checklist

Posted by Shawn O'Brien on Jan 13, 2016


The start of a new year provides an opportunity for organizations to review their operations—and strengthen digital security wherever it is lacking. Evidence suggests more hacking scandals will occur in 2016, and since no business wants to be the next headline-making hack victim, strong cyber defenses are a must. Here is a checklist of three cybersecurity tools IT teams should have in order to protect their computer assets this year.

How SOC-as-a-Service Benefits Midmarket and Small Enterprise Organizations

Posted by Kevin Landt on Dec 11, 2015


Due to a growing complexity in information security, midmarket and small enterprise organizations need to find a readily available solution that can help them protect their data. One such option is a security operations center (SOC)-as-a-service, proposed by the Enterprise Strategy Group (ESG) whitepaper, "SOC-as-a-service for Midmarket and Small Enterprise Organizations."


SANs In Your SOCs

Posted by Security Steve on Apr 17, 2015

Ironically, whether you are an IT professional or not, security, cyber risk and data breaches have hit the mainstream.  Recent headlines show that “Data security breaches have only gotten larger, more frequent and more costly. The average total cost of a data breach to a company increased 15 percent this year from last year, to $3.5 million per breach, from $3.1 million.”
Rather than becoming another statistic, companies are taking action and learning how to cut the possibility of risk down significantly with the right controls in place.  There are plenty of control sets on the market today. Security controls are safeguards and counteract or minimize security risks relating to digital property. They focus on technical aspects of information security with the primary goal of helping organizations prioritize and automate their efforts to defend against the most common and damaging insider and outsider attacks.

Northeast Blizzard: What You Need to Know to Stay Safe

Posted by Security Steve on Feb 2, 2015

The business capital of the world braced for a blizzard last week — and everything froze. Two feet of snow was expected in New York City (the actual totals were a lot lower), where Mayor Bill de Blasio banned non-essential vehicles from the road – including the city's arguably essential food delivery cars, trucks and bicycles.

SOC Expectations

Posted by Security Steve on Jan 19, 2015

2014 was a banner year for data breaches.  It really did seem as though every day a new story hit the press regarding another data breach.  And company size and sector didn’t matter.  All organizations were vulnerable to external attack, and the consequences were certainly derailing companies and their leaders' careers.  Clearly, current methods have become ineffective for proactive awareness and timely remediation of security vulnerabilities.  Simply installing traditional security products and meeting compliance checklists are not enough.

Outsourcing Your SOC

Posted by Security Steve on Jul 28, 2014

It should be common knowledge that the security of your company data is one of the most critical functions of an Information Technology program. It’s also one of the most budget- and resource-intensive functions, as well. With all of the directions you can get pulled in every day, having to deal with the headache of your security posture shouldn’t be at the top of your list. That’s where outsourcing your information security comes in. Data security outsourcing, specifically security monitoring, can be a viable and intelligent option when it comes to keeping the data in your organization secure, and it allows you to keep security levels high without having to allocate precious resources to those functions. 

Most Recent Posts

Subscribe to Email Updates