Follow Us:

Trusted Information Security Insights

Don’t Fall Victim to Cybersecurity Scare Tactics

Walk into any major cybersecurity conference, and you’ll feel like you are walking into the trailer for a horror movie.…

Written by Ron Schlecht Jr.

Tony McFelin Joins BTB’s CISO Advisory Practice

Adding strategic expertise and depth to BTB's expanding CISO Advisory team Philadelphia, PA / March 18, 2019 / BTB Security, a leading cyber security assessment, advisory, and managed detection and response firm, today announced that Tony McFelin has joined the company’s growing CISO Advisory practice. Tony will work closely with clients to implement information security programs that are practical, effective, commensurate with risk, and aligned with their business goals.…

Written by Ron Schlecht Jr.

The True Cost of a Security Operations Center (SOC)

Knowing the true cost of your SOC—including capital, payroll, recurring expenses, and care—prevents wasteful spending and keeps your operation lean. Our dedicated information security experts can show you how careful planning and wise use of resources can keep your data secure and your bottom line healthy—two things previously thought to…

Written by Matthew Wilson

A Virtual Disappearing Act

The Internet has become the world’s largest information exchange. Given a phone number, email address, license plate, LinkedIn Profile, Instagram username, or just about any other single piece of identifying information, and odds are an attacker can find the other pieces. Scary right? The sad part is, we’ve all knowingly…

Written by Matt Barnett

Did You Hear About the 2017 Data Breaches? I See the Future

In the wake of the Yahoo, Equifax, Whole Foods, Sonic Drive-in, Deloitte, Securities Exchange Commission, Viacom, Vevo… all in the last month, btw. I feel confident in predicting the future, there will be another major data breach this year. Ok, so maybe those words aren't as surprising as they once…

Written by Matthew Wilson

GO BEYOND THE BASICS

Our clients trust us to keep their businesses resilient. How secure is your organization?
Schedule Consultation

Detect: Assessments & Testing

Defend: Comprehensive Monitoring

Defeat: Incident Response & Forensics