The Basics: Secure Software Development
Secure Software Development Lifecycle (SSDLC) is an approach to software development that emphasizes the value [...]
Check Your {User} Privileges
User privileges settings in commercial software frequently (and inadvertently) expose your business to privilege escalation attacks. Monitoring for access rights changes can help to proactively mitigate the risks. [...]
AI Driven EDR: It Doesn’t Replace Human Intervention
AI driven EDR dramatically reduced the workload involved in manual endpoint detection and response. However, [...]
ROI of PuP Detection
The security impact of detecting potentially unwanted programs is sometimes fuzzy, but in our experience, [...]
Small Business Cybersecurity Myths
Small Business Cybersecurity myths and mistakes can destroy a business. Phishing attempts, Potentially Unwanted Programs, [...]
Small Businesses Need Software Updates
Software updates and patches are frequently avoided by small and medium business owners. These [...]
The Human Factor: The Hidden Problem of Cybersecurity
Humans are a significant factor contributing to data breaches. While cybersecurity is usually treated as [...]
WFH Cybersecurity Best Practices for SMEs
WFH cybersecurity best practices are virtually non-existent in 49 percent of businesses. The sudden shift [...]
What is an Incident Response Plan: Basic Guidelines for SMEs
An incident response plan provides detailed steps for crisis management in the face of a [...]
Moral Hazard of Cyber Insurance
Cyber insurance is not a replacement for harm prevention measures. The prices are high and [...]
CYDEF to Scale Beyond 1 Million Endpoints
CYDEF solution testing with CENGN establishes business capacity to grow beyond 1 million endpoints. CYDEF Identifies Opportunities to Scale [...]
macOS Coverage: Is It Worth It?
With CYDEF’s recent coverage expansion to the macOS platform, we need to address the value [...]