Understanding and Responding to Distributed Denial-of-Service Attacks
Sometimes the best advice is free advice. Especially in cybersecurity, where understanding the ‘why’ behind attacks can be as crucial as defending against them. Recently, CISA, the FBI, and MS-ISAC...
View Article5 Reasons Structured Cabling Networks are Critical for IT Security Management
A robust IT infrastructure is non-negotiable in today’s digital age. Central to this infrastructure is structured cabling, the unsung hero ensuring that data flows securely and efficiently across...
View ArticleCybersecurity in Utilities: How the Utility Industry has Become a Pioneering...
By Wayne Tung, Managing Director at Sendero Consulting Historically, the utility industry has been thought of as reliable, slow moving, and heavily regulated. People want to know that their lights will...
View ArticleTransforming SOC Operations: How TacitRed Curated Threat Intelligence Boosts...
By Holger Schulze, Scott Gordon The increasing sophistication, targeting, and volume of cyber threats facing organizations, coupled with attack surface management dynamics, requires cybersecurity...
View ArticleThe Shift from VPNs to ZTNA
In recent years, the landscape of remote work and cybersecurity has undergone significant changes, driving organizations to reevaluate their reliance on traditional Virtual Private Networks (VPNs). The...
View ArticleAI and Ethics: Expert Insights on the Future of Intelligent Technology
The history of artificial intelligence (AI) is a fascinating journey of innovation and discovery that spans decades. From the early days of simple machine learning algorithms to today’s advanced neural...
View ArticleHow do financial lenders avoid cyber threats?
The evolving technological landscape has been transformative across most industries, but it’s arguably in the world of finance where the largest strides have been taken. Digital calculators and...
View ArticleSocial media platforms that harvest the most personal data
Sizable fines imposed for data breaches in recent years indicate that regulators are increasingly determined to crack down on organizations that fail to adequately protect consumer data. Meta, for...
View ArticleWhat to Know About CISA’s New Cyber Reporting Rules
On June 3, the public comment period closed for the U.S. Cybersecurity & Infrastructure Security Agency’s (CISA) Notice of Proposed Rule Making (Proposed Rule) under the Cyber Incident Reporting...
View ArticleThe SIEM Market is Ripe with Consolidation, But are We Delivering on its...
Security Information Event Management (SIEM) technology has come far over the past two decades. SIEM is a critical part of threat detection and response in a world where Gartner identifies the...
View Article