You’re Secure – But are Your Vendors? Assessing Third Party Risk

third party risk

This post was guest-written in partnership with Avertium by Bob Maley, CSO at Black Kite. Foreword: Bob Maley on The Left / Right of Bang Approach As Chief Security Officer at Black Kite, there’s a military concept that I regularly apply to cybersecurity and 3rd party risk. It’s called Left of Bang. In any military […]

Reducing Ransomware Risk in Healthcare

mitigating ransomware in healthcare

How much are you willing to pay to get your personal data back? How about hundreds and thousands of personal data records stored in your company? The impacts of the global pandemic have put the healthcare industry at the top of the list for ransomware threats.  In fact, healthcare cyberattacks doubled in 2020, with 28% tied to ransomware.  And the truth is, ransomware is […]

The Rise of RaaS Gangs + What You Need to Know

raas blog

Since the beginning of the global pandemic, the FBI’s Internet Crime Complaint Center (IC3) has seen a 300-400% increase in daily cybersecurity complaints – many of which are ransomware-related – as both domestic and international hackers look to take advantage of Americans’ move to less secure, remote working environments. As we move into 2021, ransomware […]

Does CMMC Immunize You to Ransomware?

cmmc ransomware

While ransomware has been around for a while, it has absolutely SURGED in the past year. In part, this is due to the move to work-from-home environments, as well as the emergence of ransomware-as-a-service (RaaS) – which enables less sophisticated cybercriminals to execute a ransomware attack.   Protecting against bad actors in a constantly-evolving threat landscape […]

To CMMC & Beyond: What you can do today to prepare for CMMC tomorrow

cmmc certification

The Cybersecurity Maturity Model Certification (CMMC) is coming – whether you’re ready or not. Today, it’s primarily meant for the Department of Defense (DoD) and its subcontractors, but this comprehensive framework could be coming to an enterprise like yours in the future.  CMMC is a holistic look at cybersecurity. With cybercrime becoming ever more sophisticated, there’s a real need for a change in the way we assess our current state of cybersecurity […]

How can you leverage your SIEM as part of your Zero Trust strategy? ​

siem and ztn

Continuous monitoring is one of the most important facets of any Zero Trust Architecture. The level of trust a system has in any user, application or data flow may change from one minute to the next, and, as things change, the platforms must be able to dynamically adjust.  A robust SIEM Implementation is one of the most effective weapons you can leverage […]

What Is Security Orchestration, Automation and Response (SOAR)?

What is SOAR?

Continuing with our Cybersecurity Awareness series, Avertium answers the question, “What is Security orchestration, automation and response (SOAR)?” and provides insight into three primary capabilities a SOAR implementation enables. What Is SOAR? SOAR is a process designed to automate and accelerate security operations, analytics and reporting. Research and advisory company Gartner was the first to […]

We Have an MDR…Do We Still Need a SIEM?

Emergency Incident Response Digital Forensics

Managed security service providers (MSSPs) use a wide range of tools and strategies to help organizations detect and respond to advanced threats with the capability to bypass existing controls. Two of the most effective are managed detection and response (MDR) and security information and event management (SIEM) solutions. This article explains what MDR and SIEM […]

Understanding the Difference Between an MSSP and MDR

mssp vs mdr

There is a disturbing trend in cybersecurity: As the frequency and sophistication of cyberattacks is increasing, so is the gap between the number of cybersecurity jobs available and the number of applicants with the skills and capability to fill them. As the rule of supply and demand plays out, acquiring and retaining enough in-house expertise […]

How to Leverage Your SIEM to Detect and Respond to Ransomware

how to detect ransomware

According to the Ponemon Institute, only 20% of organizations are confident of their ability to deal with a ransomware attack. This may seem counter intuitive since the cost of a successful attack to an organization can be significant, but exemplifies the challenges endemic preventing, detecting and responding to the growing sophistication of ransomware threat actors. […]