Has your company or organization ever given serious, disciplined thought about what a data breach would cost if it happened to you? Your Chief Financial Officer can probably estimate, down …
What’s the Difference Between Cybersecurity as a Service and Cyber Incident Response?
It’s a question often asked: what is the difference between Cybersecurity as a Service and Incident Response? The short answer is, Cyber as a Service focuses on the planning and …
IT Asset Management and Cybersecurity: Data Soulmates
IT Asset Management is a critical support system for any cybersecurity program – People, processes, and technology working together to create a “single source of truth” about the hardware and …
Cyber Insurance: What is It, and Do You Need It?
Every day, there are news stories about data breaches and cybercrimes committed against retailers, banks, governments, health systems, universities, and countless other businesses. The breaches and attacks are increasing in …
The Sixth Ocean: The Age of Threat Intelligence
BY CHUCK MACKEY, SENIOR SECURITY CONSULTANT, MCPc The idea of a sixth ocean came to me from an InfoSec associate, Chris Roberts, White Hat Hacker and Researcher. He contends that …