CIPHER Selected as One of 2018 World’s Hottest & Most Innovative Cybersecurity Companies

CIPHER Selected as One of 2018 World’s Hottest & Most Innovative Cybersecurity Companies

Cybersecurity Ventures Places CIPHER on Cybersecurity 500 List CIPHER Security, a leading global cybersecurity solution provider, announced today that Cybersecurity Ventures, the world’s leading researcher and publisher of the global cyber economy, placed the company on its annual list of 500 of the hottest and most innovative security companies in ... Read More
Avoid these Failures with SIEM Tools at All Costs

Avoid these Failures with SIEM Tools at All Costs

SIEM is a powerful security tool when deployed successfully. But, gathering insights and achieving the benefits of using a SIEM tool can be a challenge and many organizations fail to do so. Unfortunately, if you’re not maximizing the value of SIEM it can leave your organization vulnerable to suffering a ... Read More
[Webinar Replay] Opportunities in SIEM Analytics

[Webinar Replay] Opportunities in SIEM Analytics

Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management platform. SIEM tools aggregate your event data produced by security devices, network infrastructure, systems and applications ... Read More
The Must-Have SIEM Features for Advanced Threats

The Must-Have SIEM Features for Advanced Threats

Investing in a SIEM solution is an important step in protecting your organization from advanced threats. However, selecting a SIEM vendor can be a challenge unless you know what questions to ask and what essential features you need from your next solution. If you know what features to look for ... Read More
Ask These Questions When Evaluating SIEM Solutions

Ask These Questions When Evaluating SIEM Solutions

Modern IT infrastructure generates a wealth of data. A large or mid-size enterprise can generate petabytes and, in some cases, even exabytes of log and metadata. Hackers know this and intentionally target organizations that are sitting on data gold mines. And, depending on how the attacker plays their cards they ... Read More

451 Research Spotlights CIPHER’s Managed Security Services Portfolio

CIPHER Named Top Enterprise MSSP Provider & Security Consultancy in New Research Report CIPHER Security LLC, a leading global cybersecurity solution provider, announced today that 451 Research, a preeminent information technology research and advisory firm, regards CIPHER as a top enterprise managed security services provider (MSSP) and security consultancy according ... Read More
20 Important Data Privacy Questions You Should be Asking Now

20 Important Data Privacy Questions You Should be Asking Now

Security and privacy leaders face some critical decisions in the years ahead to ensure their organization is completely safeguarding data. The risk of not securing data and protecting privacy is too great. But, many leaders are not sure where to start. Data privacy and information security can be daunting, and ... Read More
How to Address Ongoing GDPR Requirements

How to Address Ongoing GDPR Requirements

GDPR is one of the biggest transformations to global data privacy law within the past 20 years. Businesses and organizations are quickly preparing for the requirements which will soon be enacted on May 25, 2018 ... Read More
A Guide to the Must-Have Security Tools for GDPR Compliance

A Guide to the Must-Have Security Tools for GDPR Compliance

GDPR requires a comprehensive approach to information security, compliance, governance and risk. Even though security tools are just one piece of the GDPR compliance puzzle, they are an important aspect of protecting consumer data privacy ... Read More
The Security Alerts Your Analysts Should Be Following

The Security Alerts Your Analysts Should Be Following

Security alerts help organizations quickly detect advanced cyber attacks. However, organizations are often bombarded with alerts from an array of IT devices. In fact, IDC found that half or more of the untuned security alerts generated by organizations end up as false positives. The sheer volume of alerts generated from ... Read More
Loading...