Contact Us

Menu
  • Managed Security
    • SaaS Application Security
    • Cloud Infrastructure Security
    • Network Security
    • Endpoint Security
    • Close
  • Security Services
    • Cloud Security Professional Services
    • Pen Testing & Assessments
    • Incident Response Services
    • Cyber Threat Hunting
    • Cyber Security Exercises
    • Cyber Security Training
    • Compliance & Strategy
    • Close
  • Industries
    • Critical Infrastructure
    • Financial Services
    • Healthcare
    • Legal Sector
    • Public Sector
    • Retail and E-Commerce
    • Close
  • Resources
    • Case Studies
    • Data Sheets
    • Events
    • Infographics
    • Newsletter
    • Videos
    • Webinars
    • White Papers
    • Close
  • About
    • Board
    • Leadership
    • News
    • Careers
    • Partners
    • Close
  • Blog

Post Archive by Month

View Post

Why Penetration Testing and Assessments Should Include Real-World Scenarios

In Penetration Testing by Noah PowersJuly 26, 2018

Penetration testing and other technical assessments are designed to be practical, useful exercises to examine your security defenses and look for holes in your network or applications. There’s real value …

View Post

Why Most Real-Time Defensive Solutions Are Poor Threat Hunting Solutions

In Threat Hunting by Andrew CookJuly 20, 2018

When you enlist a hunt team to run compromise assessments, it’s important to determine which solutions and processes they’re using to actively hunt down threats. After all, compromise assessments (time-bound …

View Post

How to Test and Measure the Effectiveness of Your Security Awareness Program

In Cyber Security Awareness by Stephanie EwingJuly 13, 2018

In my previous blog, I wrote about security awareness programs and provided some high-level recommendations for how you can improve their effectiveness. In this article, I’d like to share some …

View Post

New White Paper Spotlights Methods to Avoid Cloud Misconfigurations

In Cloud Security by Devesh PanchwaghJuly 6, 2018

It’s easy to assume that cloud service providers are fully responsible for every aspect of cloud security. The truth is that configuration is an aspect of the shared responsibility model …

Recent Posts

  • Q & A: Common Misconceptions about Security in Hybrid Environments February 19, 2019
  • Tech Refresh as Part of an Effective Vulnerability Management Program: Part Two February 13, 2019
  • Third-Party Assessments: What to Expect and Why They Can Benefit You February 7, 2019
  • Tech Refresh as Part of an Effective Vulnerability Management Program: Part One January 30, 2019
  • Security Considerations for AWS Setup Outlined in New Video January 23, 2019

RSS Feed RSS - Posts

Past Six Months

  • February 2019 (3)
  • January 2019 (3)
  • December 2018 (4)
  • November 2018 (2)
  • October 2018 (4)
  • September 2018 (3)

Archive By Month

Categories

  • Cloud Security
  • Critical Infrastructure
  • Cyber Insurance
  • Cyber Security Awareness
  • Cyber Security Hiring
  • Cyber Security Strategy
  • Cyber Security Threats
  • Data Privacy
  • Data Security
  • Financial
  • Healthcare
  • Incident Response
  • Information Security
  • Insider Threat
  • Legal
  • Managed Security
  • Managed Services
  • Network Security
  • News and Events
  • Penetration Testing
  • Ransomware
  • Risk and Compliance
  • Social Engineering
  • Threat Hunting
Copyright Delta Risk ©2019 | Privacy Policy | equal opportunity/affirmative action employer | Sitemap | RSS Feed