speak to an expert

Overcoming the People Shortage

Earlier this year, HolistiCyber’s CEO, Ran Shahor, shared his thoughts on the biggest cybersecurity threat. It’s not the Russians or Chinese; it isn’t even supply chain attacks. While those are serious threats ...
speak to an expert

Keeping Assets Secured In the Entertainment Business

In our previous post, we looked at some of the major hacks that struck the entertainment industry and identified the industry’s reliance on third-party providers as a major vulnerability. Today, we’ll look ...
speak to an expert

A Breath Of Fresh Air For A Busy CISO

We’ve all been there. As Chief Information Security Officer (CISO), your team, your management, and your board are all clamoring for your time. Not to mention the dozens of items calling you ...
New call-to-action

Entertainment & Media – The Next Big Cyber Attack Target?

On November 24, 2014, Sony Pictures employees discovered that the company’s network had been hacked. Attackers stole terabytes of data, deleted the originals off computers, and threatened to release the information they ...
Temp-800x500.jpg

IT Risk Assessment: Is Your Plan Up to Scratch?

A risk assessment is a process by which businesses identify risks and threats that may disrupt their continuity and haltRead More The post IT Risk Assessment: Is Your Plan Up to Scratch? ...

Proactively Securing Your Enterprise Cloud

Somewhere right now, sitting in front of a bank of computer screens in Russia, China, or even in the United States, is a band of cyber-criminals planning a nation-state grade attack. If ...
Zero-Day: Vulnerabilities, Exploits, Attacks and How to Manage Them

Zero-Day: Vulnerabilities, Exploits, Attacks and How to Manage Them

A hacker’s goal is to identify weaknesses or vulnerabilities in an organization’s IT infrastructure that they can then exploit forRead More The post Zero-Day: Vulnerabilities, Exploits, Attacks and How to Manage Them ...
CISO Stories Podcast: Communications Before, During and After a Breach

CISO Stories Podcast: Communications Before, During and After a Breach

Figuring out what to do after a breach is the wrong time to start the planning process. Communications strategies must be in place well beforehand and there are many benefits to the ...
High Availability: What It Is and How You Can Achieve It

High Availability: What It Is and How You Can Achieve It

While it is impossible to completely rule out the possibility of downtime, IT teams can implement strategies to minimize theRead More The post High Availability: What It Is and How You Can ...
Ransomware Data Breach Notifications: Too Complex To Understand

Can Your Data Protection Software Recover from Modern Ransomware?

Your nightmare has come true. Your organization was just attacked by ransomware. They have crippled your networks, corrupted your Active Directory, encrypted business critical documents, and disabled production databases. Now the recovery ...
Security Boulevard