We Have an MDR…Do We Still Need a SIEM?

Emergency Incident Response Digital Forensics

Managed security service providers (MSSPs) use a wide range of tools and strategies to help organizations detect and respond to advanced threats with the capability to bypass existing controls. Two of the most effective are managed detection and response (MDR) and security information and event management (SIEM) solutions. This article explains what MDR and SIEM […]

Understanding the Difference Between an MSSP and MDR

mssp vs mdr

There is a disturbing trend in cybersecurity: As the frequency and sophistication of cyberattacks is increasing, so is the gap between the number of cybersecurity jobs available and the number of applicants with the skills and capability to fill them. As the rule of supply and demand plays out, acquiring and retaining enough in-house expertise […]

How to Leverage Your SIEM to Detect and Respond to Ransomware

how to detect ransomware

According to the Ponemon Institute, only 20% of organizations are confident of their ability to deal with a ransomware attack. This may seem counter intuitive since the cost of a successful attack to an organization can be significant, but exemplifies the challenges endemic preventing, detecting and responding to the growing sophistication of ransomware threat actors. […]

Vulnerability Management: Is In-Sourcing or Outsourcing Right for You?

Outsourcing Vulnerability Management

As the cyber threat landscape continues to grow ever larger and more complex, so does the ability to identify and evaluate weaknesses in your own defenses. That’s why vulnerability management (VM) should be considered a specialized area of expertise. In this three-part series, we first discussed what a vulnerability assessment is and why it’s important. […]

Attributes of a Robust Vulnerability Management Program

Attributes of a Robust Vulnerability Management Program

How to Protect Enterprises in a Challenging Security Environment Vulnerability management programs are no longer an option or a luxury for most enterprises: their subsets, vulnerability assessments, are a compliance, auditing and risk management requirement, and creating a structured program to facilitate regular and deliberate execution of this function has become important. However, many enterprises […]

What is a Vulnerability Assessment and Why Is It Important?

What is a Vulnerability Assessment and Why is it Important

Studies have shown that nearly 60% of organizations that suffer a data breach cite a known unpatched vulnerability as the culprit. One of the best ways to identify exploitation opportunities for cyber criminals is conducting a vulnerability assessment as part of a comprehensive vulnerability management program. This article explores what a vulnerability assessment is and […]

10 Ways Using SIEM Technology Can Automate Fulfilling HIPAA Regulations

Using SIEM Technology Can Automate Fulfilling HIPAA Regulations

Any organization that transmits health information electronically, including health plans, healthcare clearing houses, healthcare providers, and a covered entity’s business associates, must comply with the Health Insurance Portability and Accountability Act (HIPAA). Yet one of the top problems these organizations face is failure to properly safeguard electronic protected health information (ePHI). One of the greatest […]

How to know if your MSSP is equipped to support you through a breach

MSSP equipped to support you in case of a breach

Bad actors are relentless in their attempts to infiltrate networks. Despite the most rigorous efforts by internal teams and managed security service providers (MSSPs), the result is breaches happen. When that occurs, it’s important your MSSP is equipped to support you by being able to pivot from normal operations to emergency mode on your behalf […]

Ransomware Zeppelin Targets North American Healthcare, Managed Service Providers

Ransomware Targets Healthcare, Managed Service Providers

by Andrew Ange, Avertium Healthcare Consultant A new ransomware named “Zeppelin” is making its way across Europe and the United States. First reported on November 6, 2019,  ransomware Zeppelin continues to target healthcare companies, managed service providers and other technology companies.  Background on Zeppelin According to a report by the Cylance Threat Research Team, the […]

Employing MSSP Using Agnostic vs. Proprietary Technology

MSSP Using Agnostic vs Proprietary Technology

If your organization has decided to pursue managed security services, the next important decision quickly rises to the surface: Should you go with a service that uses off-the-shelf technology or a proprietary solution? Since the specialized technology a managed security services provider (MSSP) uses is core to protecting your data, the answer is customer-specific and […]