Data Privacy Program from Zero to Hero 

Data Privacy Program from Zero to Hero 

| | Blog
By Cecil Pineda | Senior Director of GRC vCISO at CRITICALSTART As I promised last week, here’s a short article on Developing and Implementing a Data Privacy Program. I hope you will like it and share it with your teams and colleagues.  It’s Data Privacy Day Again! Not sure if we can ... Read More
Balancing Act: How MOBILESOC can Ensure Cybersecurity while Protecting Time with Family

Balancing Act: How MOBILESOC can Ensure Cybersecurity while Protecting Time with Family

    By Tommy Scott, Senior Security Consultant | CRITICALSTART Closing the laptop and mentally disconnecting from work is a critical component of work-life balance. But there’s one problem: There are no days off in cybersecurity. For many of us, it takes time and effort to transition between the different ... Read More

Weighing the Value of Managed Security

| | Blog
  A shortage of skilled personnel is one of the most serious issues affecting security managers today. Add in challenges in maintaining a complete Security Operations Center (SOC) and the result can be gaps in cyber defense. Managed Detection and Response (MDR) services offer a viable, economical way to counter ... Read More

Death to Vulnerability Management As We Know It

| | Blog
Vulnerability Management concepts are changing. The idea that vulnerability management is limited to scanning alone is being replaced with a wider and more comprehensive view. [...] Read More... The post Death to Vulnerability Management As We Know It appeared first on Critical Start ... Read More
Steps Educational Institutions Are Taking to Defend Their Infrastructures from Cyber Attackers

Steps Educational Institutions Are Taking to Defend Their Infrastructures from Cyber Attackers

| | Blog
Just when we thought 2020 couldn’t get any worse, cyber attackers are finding new ways to capitalize on our highly technology-dependent society. They’ve always looked to industries like medical and manufacturing as an attack surface, but in the era of COVID, the landscape is rich with fresh targets that are ... Read More

The Democratization of Security: Simplification and Direction for Content Management

| | Blog
  Last week, we talked about how life could be made easier through the democratization of security permissions and access.  In particular, we discussed how Microsoft Azure Active Directory (AAD) simplifies user onboarding. There’s a second component to the Democratization of Security that can take this streamlining process even further ... Read More

The Democratization of Security

| | Blog
How Permissions Elevate both Transparency and Efficiency to Build Healthier Security Relationships [...] Read More... The post The Democratization of Security appeared first on Critical Start ... Read More

How to Develop a Cybersecurity Playbook in 5 Steps

| | Blog
A cybersecurity playbook is essential for any organization's SOC team. In this post, we cover 5 things to consider when developing a security playbook. [...] Read More... The post How to Develop a Cybersecurity Playbook in 5 Steps appeared first on Critical Start ... Read More
[2020 Updates] Gartner Endpoint Security Hype Cycle Insights

[2020 Updates] Gartner Endpoint Security Hype Cycle Insights

| | Blog
Learn what's changed with Gartner's 2020 updates to their endpoint security hype cycle: UES, XDR, BYOPC security, BEC protection, SASE, & more! [...] Read More... The post [2020 Updates] Gartner Endpoint Security Hype Cycle Insights appeared first on Critical Start ... Read More

Secure Guardrails