Follow Us:

Trusted Information Security Insights

Phishing 2.0: Old tricks still net big bucks

We’ve all heard stories of employees who got an email from their boss asking them to purchase gift cards or share sensitive corporate information. Who would fall for that, you might think? But spoofed emails purportedly from company execs or vendors are on the rise. Read on by clicking here or on the image to learn the latest on phishing scams and how to protect yourself and your organization.…

Written by BTB

How to cope with the growing wave of data privacy regulation

Keeping up with data and privacy protection regulations is an on-going challenge for companies that do business, especially with the high bar set internationally by GDPR. The trend has moved stateside as the California Consumer Privacy Act (CCPA) has been introduced bringing stringent regulations similar to the GDPR to the U.S.…

Written by Humberto Gauna

Common and Best Practices for SOCs: Results of the 2019 SANS SOC Survey

SANS conducts a global Security Operations Center (SOC) survey yearly to identify current trends, while providing best practices to enable organizations to build, manage, maintain and develop their SOCs effectively and efficiently. The results are in! The approach used this year adapted and was structured around the five major functions of the NIST Cyber Security Framework (CSF)–Identify, Protect, Detect, Respond, and Recover. The approach may not have been perfect in its execution, but did highlight the fact that many security tools operate cross-functionally, serving multiple purposes. The decision to map the survey to the NIST CSF is an indicator of the increasing importance of third-party control frameworks. Key Highlights: Lack of skilled staff is still a major concern with large percentage of respondents (58%), citing this as one of the key areas preventing success Lack of tool integration, with 43% of the respondents citing that their tools don't work together to give them comprehensive coverage and visibility across their enterprise Lack of automation and orchestration, allowing analysts to do their job more effectively and focus on higher importance alerts and incidents Get the results For more insights on SOC trends and to read the full report, click the link below. Here's another BTB Security "No BS" move, it's not behind a gate....seriously. Read it, enjoy it, learn from it. …

Written by BTB

Don’t Fall Victim to Cybersecurity Scare Tactics

Walk into any major cybersecurity conference, and you’ll feel like you are walking into the trailer for a horror movie.…

Written by Ron Schlecht Jr.

Cybersecurity has an M&A problem. CISOs should be wary.

The cybersecurity market is chaotic. New players frequently emerge, hyped as the next panacea for security woes, while incumbents are often acquired or merged with other businesses. While hype and rapid change is nothing new in any industry with the prefix “cyber” attached, it can be particularly troubling in cybersecurity, where finding the right partners is critical. Unfortunately, the rapid formation of startups, and the speed with which they are acquired makes it hard to know who to trust.…

Written by Ron Schlecht Jr.


Our clients trust us to keep their businesses resilient. How secure is your organization?
Schedule Consultation

Detect: Assessments & Testing

Defend: Comprehensive Monitoring

Defeat: Incident Response & Forensics