5 data protection policies your employees must know in the post-GDPR era

5 data protection policies your employees must know in the post-GDPR era

Here are the policies that businesses must have in place to remain GDPR compliant, and meet best practices for data privacy. The EU's General Data Protection Regulation (GDPR) went into effect in May, requiring all organizations that handle the data of EU citizens to comply with its provisions regarding collecting ... Read More
Tackling the Cyber Kill Chain with Managed Security Services

Tackling the Cyber Kill Chain with Managed Security Services

| | cyber kill chain, MSS, MSSP
Historically, IT organizations focus on prevention within information security. However, this focus puts the organization at risk with today’s rapidly evolving threat landscape. Organizations must have enough resources across their staff and technology to address new challenges with an advanced threat landscape ... Read More
CIPHER Ranked as #1 Pure Play MSSP by Channel Futures

CIPHER Ranked as #1 Pure Play MSSP by Channel Futures

CIPHER ranks as the top pure play managed security service provider (MSSP) among the world’s 501 most strategic and innovative managed service providers (MSPs), according to Channel Futures 11th-annual MSP 501 Worldwide Company Rankings ... Read More
Frost & Sullivan Recognizes CIPHER with 2018 Managed Security Services Market Leadership Award

Frost & Sullivan Recognizes CIPHER with 2018 Managed Security Services Market Leadership Award

Frost & Sullivan has recognized Cipher with the "Frost & Sullivan 2018 Managed Security Services Market Leadership Award" as a result of recent research conducted by Frost & Sullivan ... Read More
Cybersecurity Ventures Places CIPHER on List of Top Global MSSPs

Cybersecurity Ventures Places CIPHER on List of Top Global MSSPs

CIPHER Security, a leading managed security services provider (MSSP), announced today that Cybersecurity Ventures, the world’s leading researcher and publisher of the global cyber economy, placed the company on its list of the top global MSSPs ... Read More
Planning & Responding to Your Next Data Breach

Planning & Responding to Your Next Data Breach

It was the “worst year ever” for data breaches, again. According to data from the Online Trust Alliance (OTA), the number of cyber incidents targeting businesses doubled in 2017, fueled in part by the increasing reach of new attack methods. The number of reported breaches could have fallen short of ... Read More
OWASP Top 10 2017 – Ten Most Critical Web Application Security Risks

OWASP Top 10 2017 – Ten Most Critical Web Application Security Risks

The Open Web Application Security Project (OWASP) is an online community that provides free articles, methodologies, documentation, tools and technologies in the field of web application security ... Read More
What Role Does Cybersecurity Play In Your Physical Security?

What Role Does Cybersecurity Play In Your Physical Security?

Today, very few organizations depend solely on one kind of security measure to secure their organization and cover their assets. Most companies employ security systems that feature physical security protocols as well as cybersecurity protocols. However, to correctly implement physical security measures and cybersecurity measures side by side, you need ... Read More