5 Steps to Security Validation by Tracey Moon
In today’s world, cybersecurity is about the need for speed. From security professionals to those in the C-Suite, organizations need to react quickly to reduce detection time and the ability to respond to an attack ... Read More
The Most Surprising Cybersecurity Weaknesses Every CEO Should Know About by Major General Earl Matthews USAF (Ret)
CEOs need to understand their organizations’ cybersecurity weaknesses and how those weaknesses can detrimentally impact them financially and operationally. As a starting point, here are the most surprising cybersecurity weaknesses that every CEO should know about ... Read More
Operationalize Threat Intelligence with Security Validation to Improve Cyber Defenses by Lynn Harrington
Organizations can gain a deep understanding of their threat landscape through threat intelligence but often struggle to translate it into meaningful security improvements ... Read More
Mandiant Security Validation integrates its Security Instrumentation Platform with Mandiant’s Leading Threat Intelligence through Threat Actor Assurance Module (TAAM) by Lynn Harrington
TAAM provides organizations the means to operationalize timely, relevant intelligence for continuous cyber security validation to bolster defenses and outmaneuver motivated threat actors ... Read More
Security Effort does not Equal Security Effectiveness: 3 Stats Every CEO Should be Asking Their CISOs About NOW by Major General Earl Matthews USAF (Ret)
Without the right tools and resources to continuously measure and monitor controls, security professionals simply do not have the quantitative evidence to know where they have security gaps ... Read More
Janice Kennedy of Mandiant Security Validation Recognized as One of CRN’s 2020 Women of the Channel by Tracey Moon
Each year, CRN, a brand of The Channel Company, recognizes leading female executives for their accomplishments over the past year and the far-reaching impact they are having on the technology industry going forward ... Read More
Women Changemakers in Cybersecurity by Brian Contos
Women in Cyber: Below you’ll find one of the largest podcast aggregations of women in cybersecurity on the Internet ... Read More
Now Available: Mandiant Security Effectiveness Report 2020 by Tracey Moon
Report finds that a majority of attacks successfully infiltrate enterprise environments without detection ... Read More
Security Validation Controls 5 Key Steps to Take Now by Brian Contos
Cyber security professionals are tasked with validating that cybersecurity controls are effective against potential security threats ... Read More
2020 Mandiant Security Effectiveness Report, A Deep Dive Into Cyber Reality by Tracey Moon
Addressing the perception versus reality conundrum ... Read More