Five Questions to Ask Before Choosing an MDR Solution
As the name implies, Managed Detection and Response (MDR) is a cybersecurity service providing [...]
How one client found out their cybersecurity tools failed them
Recently, a large organization with many locations decided to take us up on our free [...]
The Log4j vulnerability and why patches aren’t enough
You may have read recently about Apache’s Log4j vulnerability impacting vendors such as Microsoft, Cisco, [...]
Cybersecurity Acronym Soup
LinkedIn presents an endless list of concerns and complaints about the ongoing evolution of [...]
Cybersecurity for remote workers (infographic)
Infographic Transcription: Cybersecurity for remote workers TAKE CYBERSECURITY HOME WITH YOU More [...]
How MDR Improves Your Managed Service Business’ Bottom Line
Managed Detection and Response (MDR) solutions improve a managed service business’s bottom line by reducing [...]
Data Breaches and How to Prevent Them
Data breaches occur when a cyber attacker illegally accesses confidential information. Investing in cybersecurity awareness [...]
Handling Ransomware Attacks to Minimize Disaster
Ransomware attacks take place in two phases: access development, then monetization. Stopping cyber attacks while [...]
SOC 2: What Is It and Why Should You Care
SOC 2 is a reporting standard used to assess a business’ internal controls related to Information Technology. It is [...]
CYDEF’s Approach to a Secure Software Development Life Cycle
A Secure Software Development Life Cycle (SSDLC) is a collection of best practices that provides added security checks to the standard software development [...]
Cyber Threat Research: Nuclear Power Plant Cyber Attack
In early September 2019, the Kudankulam Nuclear Power Plant in Tamil Nadu, India suffered a [...]
Cybersecurity: The Need To Find Common Ground
According to Colonial Pipeline CEO Tim Felt, paying ransom for the return of his company’s data was the hardest thing [...]