| Aug 20, 2020 EDR vs. MDR: Which Threat Detection is Right for You? This post explores using EDR vs. MDR for threat detection to protect against cybersecurity threats to help determine which is right for your organization.
| Aug 18, 2020 Is Artificial Intelligence (AI) in Cybersecurity the ultimate solution? Short Answer: No, and also Yes This post provides an examination of artificial intelligence in cybersecurity for a more profound understanding of precisely what AI can and cannot do.
| Aug 17, 2020 Russian Drovorub malware affects Linux Systems This threat report covers the Drovorub malware, which affects Linux systems and is attributed to the Russian military unit known as the GRU.
| Aug 13, 2020 Using Application Whitelisting Best Practices to Stop Malware We dive into the difference between whitelists vs. blacklists to explore using application whitelisting software in order to stop malware. Read the blog.
| Aug 11, 2020 Make PCI Compliance Easier; Automate PCI DSS Requirement 11.2 Automating PCI DSS Requirement 11.2 using vulnerability scanning is the best way for a merchant or service provider to fulfill the mandate.
| Aug 6, 2020 Least Privilege: Minimizing Permissions to Improve Cybersecurity Why least privilege through minimizing permissions and account separation is worth the resulting lowered exposure to cyberattacks.
| Aug 5, 2020 Ensiko Web Shell Infects Windows, Linux and MacOS Systems This threat report provides actionable intelligence to protect against the Ensiko web shell that affects Windows, Linux, and MacOS systems.
| Aug 4, 2020 How to apply SOC 2 Type 2 Trust Services criteria to your business This article explains the SOC 2 Type 2 Trust Service Criteria (TSC) for SOC audit reports and how to apply them to your business.
| Jul 30, 2020 Demystifying Zero Trust: What is Zero Trust Security, and how can it bolster your environment? What is Zero Trust security? How can it bolster your information security environment? Learn if a zero trust security model is right for your organization.
| Jul 28, 2020 SOC Audit Report Basics: The What, Why, Who and How Learn SOC audit report basics: What is a SOC audit report, what's the difference between a SOC 1, SOC 2 and SOC 3 report, Type 1 vs. Type 2, and more.