A secure computer illustrated through a lock around the monitor.

How to Improve Your Office 365 Data Protection and Threat Mitigation Strategies

In today’s post, we’ll discuss how to improve your Office 365 data protection and threat mitigation approach to better protect your environment from external threats. In our previous post about Office 365 security features, we outlined how to make the deluge of Office 365 security event information actionable. We also highlighted the importance of implementing sound identity, access, and privilege management approaches. Now let’s see what else you… Read More

Hands holding a tablet connected to a secure Office 365 cloud

Office 365 Security Features Demystified

Microsoft has numerous Office 365 security features built in to help you monitor activity, protect data, identify threats, and manage identity, access, and privileges. But getting the most out of those tools can be difficult, particularly for mid-sized organizations. Integrating them with data from other sources in your network and cloud is even more challenging…. Read More

Hands holding mobile devices connected to the cloud.

2019 Cloud Security Research: Take the Survey and Get the Free Report

Delta Risk has partnered with Cybersecurity Insiders to examine the latest trends in cloud security. Everyone who completes this comprehensive survey will receive a copy of the complete 2019 Cloud Security Report as a thank you as soon as it is published. The survey is based on real-time feedback from IT security professionals in the… Read More

Security in hybrid cloud environments.

Q & A: Common Misconceptions about Security in Hybrid Environments

In advance of our upcoming webinar on “How to Prepare for and Recover from Attacks in Hybrid Enterprise Environments,” Lauren Bellero spoke with the presenters, Macie Thompson, CISSP, Director of Delta Risk’s Incident Response team, and Chris Murphy, CISSP, Director of Solution Architecture Managed Security Services. The team discussed some of the common misconceptions about security… Read More

Security Considerations for AWS Setup Outlined in New Video

The Delta Risk Cloud Security Team just released a new video, “Key Security Considerations for AWS.” If your business is using AWS or Azure cloud infrastructure for new application development, or even to migrate legacy applications, you’ll benefit from watching the video. With security and compliance as a top concern, you need to be able to mitigate… Read More

GAO logo

GAO: Federal Agencies Still Vulnerable to Cyber Attacks

The Government Accountability Office (GAO) says in a new study, GAO-19-105: Federal Information Security, that most federal agencies are falling behind on implementing federal cyber security standards. The study said federal agencies need improvement and called on the agencies to do a better job protecting against intrusions. The GAO uses the NIST Cybersecurity Framework (CSF) to… Read More