Contact Us | | Login

Cloud security and SOC-as-a-Service Menu
  • SOC-as-a-Service
    • SaaS Application Security
    • Cloud Infrastructure Security
    • Network Security
    • Endpoint Security
    • Close
  • ActiveEye Platform
  • Security Services
    • Cloud Security Professional Services
    • Pen Testing & Assessments
    • Incident Response Services
    • Cyber Threat Hunting
    • Cyber Security Exercises
    • Compliance & Strategy
    • Industries
      • Critical Infrastructure
      • Financial Services
      • Healthcare
      • Legal Sector
      • Public Sector
      • Retail and E-Commerce
      • Close
    • Close
  • Resources
    • Case Studies
    • Data Sheets
    • Events
    • Infographics
    • Newsletter
    • Videos
    • Webinars
    • White Papers
    • Close
  • About
    • Board
    • Leadership
    • News
    • Careers
    • Partners
    • Close
  • Blog

Category Archive

  • Cloud Security / March 19, 2019

    Office 365 Security Features Demystified

    View Post
  • Cloud Security / December 3, 2018

    Delta Risk CEO Scott Kaine Featured on “Insights & Intelligence” Cloud Security Podcast

    View Post
View Post

Breakthrough Listen Teams Up with SETI Institute to Host Out of This World Wireless Research Conference

In Cyber Security Strategy, News and Events, Penetration Testingby Michael PiscopoJune 25, 2019

The GNU Radio Foundation recently teamed up with the UC Berkeley SETI Research Center and the Breakthrough Listen project to sponsor the SETI RF Hackathon, an unprecedented wireless hackathon event. Encompassing the ultimate in Internet-of-Things …

View Post

Why You Still Need Pen Testing in 2019

In Penetration Testingby Wayne MuranakaApril 18, 2019

Why do you still need pen testing in 2019? Quite simply, because you need a secure network – and your network is a moving target. A penetration test can give you a snapshot of your overall security posture, along …

View Post

Vulnerability Assessments Overview: An Essential Component to Your Cyber Security Program

In Cyber Security Strategy, Penetration Testingby Keith MelanconNovember 27, 2018

In this week’s blog we’ll share a vulnerability assessments overview and discuss how they can help you find holes in your security programs before malicious hackers can take advantage of …

View Post

The Beginner’s Guide to External Penetration Testing Reconnaissance

In Penetration Testingby Michael PiscopoSeptember 6, 2018

External penetration testing reconnaissance is a critical first step in a professional security assessment. By using the same methods and resources that attackers use to get into networks, along with open …

View Post

Why Penetration Testing and Assessments Should Include Real-World Scenarios

In Penetration Testingby Noah PowersJuly 26, 2018

Penetration testing and other technical assessments are designed to be practical, useful exercises to examine your security defenses and look for holes in your network or applications. There’s real value in performing these …

View Post

The Skills and Qualifications Every Successful Penetration Tester Must Have

In Penetration Testingby Noah PowersDecember 1, 2017

Any time I’m asked to speak about my experience in the cyber security field, whether I’m at a trade show or speaking to candidates interested in breaking into the industry, …

Recent Posts

  • How to Determine if SOC-as-a-Service is Right for Your Organization November 27, 2019
  • New G Suite Security Features Protect Against Rogue Apps November 25, 2019
  • Lessons from Cyber Attacks on Local Governments—Are You Protected? November 18, 2019
  • Considering Next-Gen Endpoint Security? Where to Start November 6, 2019
  • [NCSAM Blog] How to Protect Your Digital Profile October 31, 2019

RSS Feed RSS - Posts

Past Six Months

  • November 2019 (4)
  • October 2019 (6)
  • September 2019 (4)
  • August 2019 (6)
  • July 2019 (5)
  • June 2019 (7)

Archive By Month

Categories

  • AWS Security
  • CISO
  • Cloud Security
  • Critical Infrastructure
  • Cyber Insurance
  • Cyber Security Awareness
  • Cyber Security Exercises
  • Cyber Security Hiring
  • Cyber Security Strategy
  • Cyber Security Threats
  • Data Privacy
  • Data Security
  • Employee Training and Awareness
  • Endpoint Security
  • Financial
  • G Suite Security
  • Healthcare
  • Incident Response
  • Information Security
  • Insider Threat
  • IT security
  • Legal
  • Managed Security
  • Managed Services
  • Network Security
  • News and Events
  • Patching
  • Penetration Testing
  • Public Sector
  • Ransomware
  • Risk and Compliance
  • SOC-as-a-Service
  • Social Engineering
  • Threat Hunting
Copyright Delta Risk ©2019 | Privacy Policy | equal opportunity/affirmative action employer | Sitemap | RSS Feed