Use these Critical Security Controls for a Better Security Posture

|
As we near the end of 2018, technology professionals and businesses alike are looking back on the last 12 months and evaluating highs and lows. For businesses, this can be an essential step when it comes to evaluating the current state of security processes and protocol within the organization. The ... Read More
The Key Components to an Information Security Policy

The Key Components to an Information Security Policy

|
Information Security Policy (ISP) is a set of rules enacted by an organization to ensure that all users or networks of the IT structure within the organization’s domain abide by the prescriptions regarding the security of data stored digitally within the boundaries the organization stretches its authority ... Read More

Consider These Factors When Calculating the Cost of a Data Breach

|
Data breaches are one of the most common types of security incidents. It is quite possible, although it may be hard to prove, that every company around the globe was at some point a victim of information leakage ... Read More

Ways to Reduce the Exorbitant Costs of a Data Breach

|
Reducing the cost of data breaches is a vital consideration for any good security strategy. In fact, when a breach occurs, many factors can influence its cost, either increasing or decreasing the final amount. Some of those aspects are external to the company, such as laws and regulations, and must ... Read More
Ten Ways Your Healthcare Org May Be Violating HIPAA

Ten Ways Your Healthcare Org May Be Violating HIPAA

|
HIPAA legislation was established by the US Federal Government in 1996. These are rules and standards designed to protect the security and privacy of patient health information. It has implemented national requirements for organizations and individuals designed to enforce certain technical, physical and administrative safeguards to maintain the integrity, availability, ... Read More

The Pros and Cons to Outsourcing Incident Response

|
Companies usually outsource tasks if they are more cost effective and can produce consistent results. Outsourcing incident response functions ensures a company will get consistent, reliable results if an incident occurs. Many cybersecurity jobs go unfilled, because the pool of qualified applicants is currently smaller than the amount of jobs ... Read More

Stretching Your Security Budget Dollars

|
An excessive security budget isn’t the only way to build strong security ... Read More

Training Ideas for Machine Learning in Security

| | Machine Learning security
If you’ve been evaluating new security tools, you’ve undoubtedly heard machine learning (ML) touted many times. It is fast becoming the backbone of all modern software, security systems included. Thus, it appears that resistance is futile, as some version of Skynet is likely inevitable—although which version ultimately manifests depends entirely ... Read More
CIPHER Security Named to 2018 MSSP Alert Top 100 Managed Security Services Providers List

CIPHER Security Named to 2018 MSSP Alert Top 100 Managed Security Services Providers List

| | awards
Second Annual List Honors Leading MSSPs and Cyber Security Companies that Safeguard Customers’ Digital Assets MSSP Alert, published by After Nines Inc, has named CIPHER Security to the Top 100 MSSPs list for 2018. The list and research identify and honor the top 100 managed security services providers (MSSPs) that ... Read More

Placing More Importance on Data Security

|
The amount of data companies use and store has become so large and cumbersome that it is more difficult to correlate and control. Organizations are too often careless in their behavior surrounding data. This leads to data seeping out of the company in different ways. Malware is still a threat, ... Read More
Loading...