Security Elements Blog

Security Elements Blog

Blogs by Topic

All General Security NewsPCIHIPAAFrameworks & StandardsIncident ResponseManaged SecurityCloud SecurityTips & Tools
We have an MDR...Do we still need SIEM?

We Have an MDR…Do We Still Need a SIEM?

October 22, 2020

Managed security service providers (MSSPs) use a wide range of tools and strategies to help organizations detect and respond to advanced threats with the capability to bypass existing controls. Two...

Read More
Personal Data Privacy Compliance

Understanding Personal Data Privacy Compliance Obligations to Protect Your Customers, Partners and Employees

October 20, 2020

Many organizations are facing questions from their customers that go beyond the typical queries about the current business mission: they’re being asked about how the organization manages personal data and...

Read More
What is XDR and Why is it Gaining Momentum

What Is Extended Detection and Response (XDR), and Why Is It Gaining Momentum as a Security Solution?

October 15, 2020

IT security can be a confusing alphabet soup of acronyms, and now we’re adding a new one to the mix. Extended detection and response (XDR) is a new security solution...

Read More
What is MITRE ATT&CK and How Is it Being Used

What Is MITRE ATT&CK and How Is It Being Used

October 14, 2020

We’ve previously discussed MITRE and how Avertium uses its Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) framework as an important component of our comprehensive 24x7x365 managed security services. We feel...

Read More
What is Ransomware-as-a-Service

Threat Focus: What Is Ransomware-as-a-Service?

October 8, 2020

Ransomware appears to be everywhere. Reports of new attacks are a common feature of security news, with high profile incidents that include crippling attacks on health care, government and education...

Read More
Understanding Insider Threats

What Every Cybersecurity Pro Should Understand About Insider Threats

October 6, 2020

As we continue our October Cybersecurity Awareness Month series, we want to be certain our readers understand insider threats since they are prevalent, yet often avoidable. An insider threat is...

Read More