Case study – The evolution of a solution

Case study – The evolution of a solution

The time had come for a contract renewal with one of our Managed Security Services clients, and we started the conversation with a look back at what we have accomplished together since 2015 when the relationship began. At that time, the main focus was on replacing...
Payment Card Industry (PCI) Data Security Standard 4.0 is Coming

Payment Card Industry (PCI) Data Security Standard 4.0 is Coming

Payment Card Industry Data Security Standard (PCI DSS) 4.0 is on the horizon. More details are expected late 2020 with the requirements to be in use in mid-2021. There have been a few releases from the PCI Council on what to expect in the new version of the digital...
5 Tips for Effective Log Analysis

5 Tips for Effective Log Analysis

The technologies that you have invested in can provide even more value if you are able to analyze the log data effectively.  Here are 5 key tips: Know which logs to monitor and which not to monitor.  With the average infrastructure generating millions of log events,...
What is Cyber Security as a Service (CSaaS)

What is Cyber Security as a Service (CSaaS)

When you think about information technology implementation and support, the optimal solution is often the combination of internal resource(s) who know the business, the culture and the current technologies and controls and an outside resource who specializes in the...
A Third Party Claims You Have Been Breached, What Do You Do?

A Third Party Claims You Have Been Breached, What Do You Do?

Organizations sometimes ignore breach notifications because of a loophole in virtually all privacy regulations – they do not address third-party notifications, so companies feel free to ignore them. Whether deliberate or a casualty of the notification overload...