Threat Hunting Basics

Posted on Leave a comment

Threat hunting is an active cyber defense activity that proactively searches for threats, generally from advanced persistent threats, already in the environment that have not been either identified by the existing tools or may not have been actioned by the network defense team. It is a separate but related sets of skills from a SOC […]

Outsourcing Differences: Information Technology (IT) and Cybersecurity

Posted on Leave a comment

Outsourcing is a powerful option that allows an enterprise to focus on its core competencies and not become distracted by both information technology and security functions, which can be more efficiently provided by mission-focused companies.  But, in making the strategic decision, a company needs to understand the natural tension between an information technology (IT) company […]

Healthcare Security

Posted on Leave a comment

Cyber Attackers Targeting Healthcare How do you protect yourself and your patient’s information? There have been 229 data breaches affecting 6.1 million individuals submitted to HHS’ Office for Civil Rights’ breach portal since the start of 2018, according to HealthcareInfoSecurity. Of the breaches reported to OCR since the start of 2018, 91 are listed as […]