Microsoft Warns This New Vulnerability Could Lead To The Next WannaCry

Posted by Jessica Grube on May 16, 2019 3:45:36 PM

Microsoft is warning that an exploit with the magnitude of the WannaCry attack that crippled computers worldwide two years ago could be imminent if people fail to patch a high-severity vulnerability. 

Read More

Topics: cybersecurity, cyber attack, wannacry, microsoft, vulnerability

Assessment Tool: Grade Your Banking Cybersecurity Operational Health

Posted by Alyssa McCord on Apr 23, 2019 6:00:00 AM

Threats are evolving and security operations are becoming increasingly more complex. Without the right people, process, and technology in place, threats could be imminent. But just how complex has it become?

Before we discuss our new Banking Cybersecurity Assessment Tool designed to grade your security operational health, let's take a look at a few of that facts related to the challenges facing security professionals today.

Read More

Topics: cybersecurity, banking, community bank, banking cybersecurity central

The Top Cybersecurity Best Practices To Follow In 2019

Posted by Jason Riddle on Apr 4, 2019 1:20:00 PM

Identifying and utilizing cybersecurity best practices is infinitely more complicated than it was a few years ago. Between constant patch updates, attacks that have never been seen before, and new compliance mandates, there’s a lot to balance while managing security operations. So, how can you ensure that your company is keeping up with the latest in cybersecurity best practices?

Read More

Topics: cybersecurity, incident response, data security, cybersecurity operations

Defeating Social Engineering Attacks: Cybersecurity Training Is Key

Posted by Jason Riddle on Apr 4, 2019 7:01:00 AM

Social engineering is an insidious – and highly successful – method of data theft. Training users to spot social engineering attacks is the key to beating them.

Read More

Topics: cybersecurity, cyber attack, data security, cybersecurity operations, social engineering

How To Break Down Your Organization's Cybersecurity Silos

Posted by Alyssa McCord on Apr 3, 2019 11:15:12 AM

A silo mentality is defined by the Business Dictionary as “a mind-set present in some companies when certain departments or sectors do not wish to share information with others in the same company.”

Although cybersecurity attacks and data breaches have become one of the biggest threats to businesses over the past several years, because cybersecurity is a relatively complex topic and a part of business that isn't directly tied to generating revenue, there’s often a disconnect between the boardroom and the IT room, resulting in cybersecurity silos.

Read More

Topics: cybersecurity, cybersecurity operations, managed security services

3 Key Features To Look For In A Managed IDS/IPS Solution

Posted by Alyssa McCord on Apr 2, 2019 1:57:45 PM

A managed IDS/IPS service is great for those who are looking for non-stop protection against cybersecurity attacks. In a world where cybersecurity attacks can occur at any moment, it pays to have a reliable IDS/IPS service that you can trust. In this blog post, we'll discuss what features to consider when evaluating IDS/IPS solutions.

Read More

Topics: cybersecurity, IDS/IPS, intrusion detection, intrusion prevention, what is IDS/IPS

5 Reasons You Need A SIEM Solution

Posted by Nick Walters on Mar 21, 2019 3:49:57 PM

5 Reasons You Need A SIEM Solution

In recent years the business world has seen a shift in data storage and management towards the cloud. In fact, according to some studies, 57% of businesses already utilize a central cloud; and a further 24% plan to do the same.

Read More

Topics: cybersecurity, SIEM, cloud security

Outsourcing Security Services Pros and Cons

Posted by Jason Riddle on Mar 11, 2019 12:56:33 PM

Outsourcing cybersecurity is becoming increasingly popular as cybersecurity continues to be one of the fastest growing areas of business. The reason it’s growing so rapidly is simple - the threat of cyber attacks are increasing and it’s putting pressure on companies in almost every industry to hire cybersecurity professionals to manage the growing demand. According to Cybersecurity Ventures, there could be as many as 3.5 million unfilled cybersecurity jobs by 2021. 

Read More

Topics: cybersecurity, cybersecurity operations, MSSP, managed security services

4 Steps To Protect Your Cloud Environment with SIEM

Posted by Nick Walters on Mar 5, 2019 10:29:26 AM

The cloud has become the primary environment that businesses use to store and manage data. According to a recent study, 57% of enterprises already have a central cloud team with another 24% planning one.

Because of this shift, Security Information and Event Management (SIEM) has become a common security control and it’s essential to start protecting your cloud environment with SIEM.

Read More

Topics: cybersecurity, managed security services, SIEM

Is It Time To Evaluate Managed IT Security Services Providers?

Posted by Jason Riddle on Mar 3, 2019 8:42:00 AM

A Ponemon study found that the average time it takes for a business to identify a data breach is 191 days - that’s more than 6 months. Concern over the impact of successful cyber attacks is widespread, and they also found that less than half of IT security practitioners surveyed believe they can protect their organizations from cyber threats.

Read More

Topics: cybersecurity, data security, cybersecurity operations, MSSP, managed security services

Cybersecurity Central

Knowledge is power.

When it comes to ever-changing advanced cybersecurity threats facing organizations today, knowledge is power. We're here to arm you with everything you need to know to become the security leader you strive to be.

Sign up for the CyberMaxx newsletter to stay up-to-date on:

  • The latest cybersecurity news
  • Need-to-know threat intelligence
  • Insight from industry leaders
  • And more

 

Subscribe Here!

Recent Insight