Skip to content
Secure Smarter — Solutions for Modern Threats

From AI-driven SecOps to cloud security automation, Foresite delivers fully managed and scalable security solutions tailored for enterprise, hybrid, and multi-cloud environments.

Why Foresite — Security Excellence, Your Way

From our Adaptive Security Model to our Google Cloud Premier SecOps Partnership, we combine deep expertise, purpose-built technology, and customer-first flexibility.

Google Cloud Security — delivered by Foresite,
Premier SecOps Partner

Combine Google’s native security power with Foresite’s expert-driven, AI-powered operations to secure your cloud and unlock business growth.

Foresite - Google Cloud SecOps Delivery Partner Badge

Security Blog

Brad Thomas
by Brad Thomas
on April 9, 2025

Organizations undertaking SIEM platform migrations frequently encounter a dual objective: capitalizing on the advanced capabilities of the new platform while ensuring continuity with existing ...

Navigating SIEM Migration: Balancing Parity and Progress

A Step Towards Secure Software Development

Why did NIST add Governance in version 2.0 of the Cyber Security Framework (CSF)?

Navigating Florida’s Cybersecurity Immunity Act: What You Need to Know

Vulnerability Scanning & Penetration Testing Cadence

Why Aren’t Security Tools More Effective?

10 Ways to Measure Governance, Risk, and Compliance

Microsoft Renaming Azure AD to Microsoft Entra ID

New SEC Cybersecurity Rule Postponed

What Type of Penetration Testing Should I Use?

Thinking outside the Tanium box

Updates to Payment Card Industry Data Security Standard (PCI DSS)

Upcoming Cybersecurity Regulations 2023

Cybersecurity Glossary for Non-IT Professionals

What are Managed Cybersecurity Services?

Why Cybersecurity in Healthcare is Important

What is Intrusion Detection?

What is Information Security?

The Basics of Security Tool Management

What is a SOC as a Service?

Compliance Assessment FAQs

Business Guide to Data Breach Response

What Every Cyber Security Professional Should Know about Managed Detection and Response

OWASP Top 10: Injection

Vulnerability Assessment vs Penetration Testing

Why Business Continuity and Disaster Recovery Might Fail

Seven Tenets of Zero Trust Architecture

What to Expect from PCI 4.0

Managing Cyber Insurance and Risk in 2022

Why patching alone isn’t the answer to cybersecurity

Why does your MSP need a SOC in 2022?

5 Easy Steps for SMBs to Launch Cyber Security

What goes into good infosec documentation?

What requirements of new privacy law do you need to know?

Would Cybersecurity Safe Harbor Law Protect Your Business or Clients?

Why do you need SOCaaS?

Protecting Against Ransomware Attacks

True stories of cyber risks

What is the motivation behind ransomware?

What I wish MSPs knew about cyber insurance applications

Should MSPs take a stronger stance on security?

What’s the real story with CMMC?

US may address data security through new legislation

10 things the C-Suite needs to understand about cybersecurity

What basics do I need to know about quantum computing?

What is the government doing to protect us from cybercrime?

FISMA vs. FedRAMP and NIST: Making Sense of Government Compliance Standards

What is Cyber Security as a Service (CSaaS)

A Third Party Claims You Have Been Breached, What Do You Do?

Serverless Computing Security Considerations

Feedback that might be the answer to your questions about SIEM and MSSP

Is your SOC ready for the future?

What does this story about celebrity data mean for you?

Should You Rely On Your Cyber Insurer for Incident Response?

What is MITRE ATT&CK?

What grade would your school get in cybersecurity?

What Are HIPAA Log Requirements?

What Do Sharks and Cows Have to Do with Cybersecurity Risks?

State Of Cybersecurity In 2020

What is the proposed “Hack Back” Bill?

What is SASE?

Which Solution Is Best to Control Access?

NIST CSF – Part 4 – Respond

Cybersecurity Risks Are Threatening Deals

Why Do You Need Dark Web Monitoring?

The Accidental Insider Threat – A clear and present risk

Report on Ransomware Q4 2019

The Importance of Source Code for Web Application Penetration Testing

Deception Technology – Fooling the Enemy

Foresite Expands Services to Include Patch Management Services

New NIST Requirements Increase Cyber Security Controls

What is Credential Stuffing?

What is proactive incident response?

Poorly Written Ransomware Still Infects Unpatched Systems

Why you should frustrate your pen testers

What do our clients say about working with Foresite?

What is cyber threat hunting?

CASE STUDY: The unique complexity of cyber security municipalities and governments

Using Secure Containers For Cybersecurity

New Opinion From The American Bar Association On Cyber Responsibility

Personal Information Protection and Electronic Documents Act (PIPEDA) changes 11/1

Should my business consider browser isolation?

Zero Trust Networks

What is the “NIST Act to Benefit Small Business”?

Are you wasting money on this common cybersecurity investment?

What is the cyber responsibility of Boards and C-Levels?

From MSP to MSSP – Is it that simple?

SaaSMAX Debuts a Multitude of Channel-Friendly SaaS & Cloud Software Solutions at 2018 Channel Partners Conference & Expo

What do you need to know if you transmit or maintain health data?

True cost of SIEM (Security Information and Event Management)

Few Corporate Attorneys are Prepared for a Data Breach – 3 Steps to Prep

What is considered “personal data” that needs protection under GDPR?

Why are data breaches not slowing down?

When will cyber enforcement hit the education sector?

Banks With Bad Cybersecurity Could Face SWIFT Justice

Foresite’s Response to 7 SIEM Situations That Can Sack Security Teams

Avoid Being the Next Equifax – Learn From Their Recent Breach

Upcoming compliance deadlines

What is the business impact of a cyber incident?

What makes our ProVision solution different from other MSSPs?

Why not all healthcare breaches are reported, and what OCR is doing about it.

What can Wannacry and Petya outbreaks teach us about cybersecurity?

Why is separation of duties important when it comes to IT vendors?

Wannacry Ransomware

3 Tips for Building a Long-Term IT Security Strategy

Foresite and check point partner to solve a real information security challenge for smb market

Encryption options to satisfy regulations and protect data

What is Crimeware?

Why are CEOs failing cybersecurity?

What makes something secure?

“Unreasonable data security” could now subject you to FTC fines

Increase expected in cybersecurity whistleblowers

Why is Academia at such a high risk for data breaches (and what can we all learn from it)?

The importance of being vigilant

FDIC warns banks to beef up cyber security

You’ve been breached, now what?

What not to ask your IT compliance auditor

“Modernizing” Cybersecurity

When is it legal to access data…and how is that determined?

Monitoring User Behavior

Understanding the relationship between compliance and security

What role can professional security services play in your journey to combat the new persistent threat landscape?

The real cost of a “low-cost” audit

PCI Council Updates Guidelines for Penetration Testing

What is needed for a successful Incident Response program?

What is likely the weakest link in your cyber security?

Is Traditional SIEM good enough for Protecting your Business?

Are you challenged with increasing security and compliance demands?

What is the difference between a penetration test and a vulnerability scan?

What does the SEC’s “Culture of Compliance” mean for hedge funds?

Moneo Technology Solutions Announces Significant Gains In First Year Of Business