Skip to content
Blog Contact Us
Delta Risk logo
  • SOC-as-a-Service
    • SOC-as-a-Service Overview
    • SaaS Application Security
    • Cloud Infrastructure Security
    • Network Security
    • Endpoint Security
  • ActiveEye Platform
  • Security Services
    • Security Services Overview
    • Cloud Security Professional Services
    • Pen Testing & Assessments
    • Incident Response Services
    • Cyber Threat Hunting
    • Cyber Security Exercises
    • Compliance & Strategy
  • Resources
    • Cyber Security Resources
    • CISO Guidebook
    • Data Sheets
    • Events
    • Videos
    • White Papers
  • About
    • About Delta Risk
    • Board
    • Leadership
    • News
    • Careers
    • Partners
  • Blog
  • Contact

Author: John Hawley

remote workers endpoint security

Protecting Remote Workers: Why Endpoint Security Is More Critical Than Ever

March 19, 2020 | by John Hawley

Protecting remote workers with strong endpoint security is more important than ever. As we’ve heard from countless news stories and our own clients, many companies are moving to work from home policies and enabling remote staff in rapid time. Here’s a step-by-step checklist of what you can do now to protect your remote workers with… Read More

Categories: Endpoint Security
SOC-as-a-Service image

How to Determine if SOC-as-a-Service is Right for Your Organization

November 27, 2019 | by John Hawley

In today’s blog, we’ll explain what a Security Operations Center (SOC) is, and help you determine if a SOC-as-a-Service (SOCaaS) solution is right for your organization. Just because you’re tasked with managing cyber security for your company, it doesn’t mean your company is in business to do cyber security. Unless you’re a cyber security provider, your… Read More

Categories: SOC-as-a-Service
G Suite Security Features image

New G Suite Security Features Protect Against Rogue Apps

November 25, 2019 | by John Hawley

In today’s blog, we’ll take a look at some new G Suite security features. These features are designed to prevent threats from unauthorized or rogue applications. Most of our customers have already adopted enterprise Software-as-a-Service (SaaS) applications or are evaluating them. The most popular ones are office automation suites like G Suite and Office 365. These cloud-based solutions… Read More

Categories: Cloud Security, G Suite Security
Endpoint Security image

Considering Next-Gen Endpoint Security? Where to Start

November 6, 2019 | by John Hawley

If you’re considering moving to a next-gen endpoint security solution, it can be confusing. You’ll find a wide range of options from multiple vendors that offer similar capabilities, which can make it difficult to know where to start. Next-generation endpoint detection and response (EDR) solutions are still relatively new, and the market is quite fragmented…. Read More

Categories: Endpoint Security
Visualize network activity in Amazon virtual private clouds

Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster

June 27, 2019 | by John Hawley

We’ve just released a new feature in our ActiveEye platform that lets you visualize network activity in Amazon virtual private clouds (VPCs). In today’s blog we’ll discuss why we developed this capability. We will also explain how you can use it to detect potential security threats faster. DevOps teams are rapidly deploying applications to cloud environments. We… Read More

Categories: AWS Security, Cloud Security, Cyber Security Strategy, SOC-as-a-Service | Tagged: amazon web services, aws, cloud security, devops, virtual private clouds
SOC-as-a-Service Overview AWS Azure security

SOC-as-a-Service Overview: Improving AWS and Azure Security [Part II]

June 13, 2019 | by John Hawley

In part two of our SOC-as-Service overview, we’ll look at how a cloud-based security operations center (SOC) can improve AWS and Azure security, and why you should consider this instead of build a SOC. As we discussed in our previous post, many organizations are turning to SOC-as-a-Service to get the cloud security expertise they need without having to… Read More

Categories: Cloud Security, Managed Security, Managed Services, SOC-as-a-Service | Tagged: cloud security, managed security services, security operations center, SOC-as-a-Service
  • 1
  • 2
  • Next »
RSS Feed

Recent Posts

  • New ActiveEye Features Speed Threat Response, Improve Productivity September 10, 2020
  • 5 Tips for Kickstarting Your Cyber Security Program August 28, 2020
  • 4 Cyber Incident Scenarios You Should Exercise and Test August 20, 2020
  • How to Deal with Ransomware in 2020 August 14, 2020
  • Our Best Cyber Security Blogs of 2020: Mid-Year Update July 29, 2020

Categories

  • AWS Security
  • CISO
  • Cloud Security
  • Critical Infrastructure
  • Cyber Insurance
  • Cyber Security Awareness
  • Cyber Security Exercises
  • Cyber Security Hiring
  • Cyber Security Strategy
  • Cyber Security Threats
  • Data Privacy
  • Data Security
  • Employee Training and Awareness
  • Endpoint Security
  • Financial
  • G Suite Security
  • Healthcare
  • Incident Response
  • Information Security
  • Insider Threat
  • IT security
  • Legal
  • Malware
  • Managed Security
  • Managed Services
  • Network Security
  • News and Events
  • Patching
  • Penetration Testing
  • Public Sector
  • Ransomware
  • Risk and Compliance
  • SOC-as-a-Service
  • Social Engineering
  • Threat Hunting
  • Uncategorized
Delta Risk logo
106 S. St. Mary's Street
Suite 601
San Antonio, TX 78205

Other Locations

Managed Security Services

  • SOC-as-a-Service
  • SaaS Application Security
  • Cloud Infrastructure Security
  • Network Security
  • Endpoint Security
  • ActiveEye Platform

Security Services

  • Services Overview
  • Cloud Security Services
  • Pen Testing
  • Incident Response
  • Compliance
  • Assessments

Company and Resources

  • Leadership
  • News
  • Resources
  • Blog

© 2025 Delta Risk | All Rights Reserved

Privacy Policy | Your California Privacy Choices | EO/AAE | Sitemap | Contact