Skip to content
Blog Contact Us
Delta Risk logo
  • SOC-as-a-Service
    • SOC-as-a-Service Overview
    • SaaS Application Security
    • Cloud Infrastructure Security
    • Network Security
    • Endpoint Security
  • ActiveEye Platform
  • Security Services
    • Security Services Overview
    • Cloud Security Professional Services
    • Pen Testing & Assessments
    • Incident Response Services
    • Cyber Threat Hunting
    • Cyber Security Exercises
    • Compliance & Strategy
  • Resources
    • Cyber Security Resources
    • CISO Guidebook
    • Data Sheets
    • Events
    • Videos
    • White Papers
  • About
    • About Delta Risk
    • Board
    • Leadership
    • News
    • Careers
    • Partners
  • Blog
  • Contact

Author: Tempy Wright

active eye dashboard image

Security Automation in ActiveEye 2.0 Identifies and Resolves Threats Faster

October 21, 2019 | by Tempy Wright

Security automation is critical to identifying threats and resolving alerts faster. It plays a starring role in the latest release of our cloud-native Security Orchestration and Automation (SOAR) platform, ActiveEye 2.0. Here are just a few highlights of all the new features: Advanced security automation processes more than 95 percent of alerts, so our security operations… Read More

Categories: SOC-as-a-Service
Graphic showing cyber security readiness.

[New Research] 2019 Cloud Security Report Reveals Top Challenges

June 4, 2019 | by Tempy Wright

The new 2019 Cloud Security Report is here, and we’re excited to share it with you. The report includes the latest cloud security trends and data points to help you benchmark how your own organization is doing. It also has insights into cloud security threats, organizational investment priorities, and solutions. Delta Risk partnered with our colleagues at… Read More

Categories: Cloud Security
G Suite Security

G Suite Security: Five Mistakes Every Admin Should Avoid

March 28, 2019 | by Tempy Wright

If your business is migrating to or using Google’s suite of business productivity tools, you might be concerned about properly securing G Suite use. While Microsoft Office 365 still wears the cloud office productivity crown, more than five million businesses now use G Suite, and that number is growing fast. Our partners at Okta noted in their 2019 “Business @… Read More

Categories: Cloud Security, G Suite Security, SOC-as-a-Service | Tagged: cloud monitoring, cloud security, G Suite, SOC-as-a-Service
A secure computer illustrated through a lock around the monitor.

How to Improve Your Office 365 Data Protection and Threat Mitigation Strategies

March 21, 2019 | by Tempy Wright

In today’s post, we’ll discuss how to improve your Office 365 data protection and threat mitigation approach to better protect your environment from external threats. In our previous post about Office 365 security features, we outlined how to make the deluge of Office 365 security event information actionable. We also highlighted the importance of implementing sound identity, access, and privilege management approaches. Now let’s see what else you… Read More

Categories: Cloud Security
Hands holding a tablet connected to a secure Office 365 cloud

Office 365 Security Features Demystified

March 19, 2019 | by Tempy Wright

Microsoft has numerous Office 365 security features built in to help you monitor activity, protect data, identify threats, and manage identity, access, and privileges. But getting the most out of those tools can be difficult, particularly for mid-sized organizations. Integrating them with data from other sources in your network and cloud is even more challenging…. Read More

Categories: Cloud Security
RSS Feed

Recent Posts

  • New ActiveEye Features Speed Threat Response, Improve Productivity September 10, 2020
  • 5 Tips for Kickstarting Your Cyber Security Program August 28, 2020
  • 4 Cyber Incident Scenarios You Should Exercise and Test August 20, 2020
  • How to Deal with Ransomware in 2020 August 14, 2020
  • Our Best Cyber Security Blogs of 2020: Mid-Year Update July 29, 2020

Categories

  • AWS Security
  • CISO
  • Cloud Security
  • Critical Infrastructure
  • Cyber Insurance
  • Cyber Security Awareness
  • Cyber Security Exercises
  • Cyber Security Hiring
  • Cyber Security Strategy
  • Cyber Security Threats
  • Data Privacy
  • Data Security
  • Employee Training and Awareness
  • Endpoint Security
  • Financial
  • G Suite Security
  • Healthcare
  • Incident Response
  • Information Security
  • Insider Threat
  • IT security
  • Legal
  • Malware
  • Managed Security
  • Managed Services
  • Network Security
  • News and Events
  • Patching
  • Penetration Testing
  • Public Sector
  • Ransomware
  • Risk and Compliance
  • SOC-as-a-Service
  • Social Engineering
  • Threat Hunting
  • Uncategorized
Delta Risk logo
106 S. St. Mary's Street
Suite 601
San Antonio, TX 78205

Other Locations

Managed Security Services

  • SOC-as-a-Service
  • SaaS Application Security
  • Cloud Infrastructure Security
  • Network Security
  • Endpoint Security
  • ActiveEye Platform

Security Services

  • Services Overview
  • Cloud Security Services
  • Pen Testing
  • Incident Response
  • Compliance
  • Assessments

Company and Resources

  • Leadership
  • News
  • Resources
  • Blog

© 2025 Delta Risk | All Rights Reserved

Privacy Policy | Your California Privacy Choices | EO/AAE | Sitemap | Contact