Best Cyber Security Blogs image

Our Best Cyber Security Blogs of 2019

The team at Delta Risk published many cyber security-related blogs throughout 2019. We’ve blogged about topics such as ransomware, cloud security, next-gen endpoint security, cyber security awareness, and much more. In case you missed any of these when they were published, here’s a roundup of our best cyber security blogs of 2019. Security Automation in ActiveEye 2.0… Read More

Elasticsearch image

Elasticsearch: How We’re Using it to Improve Security

In today’s blog, we’ll explain what Elasticsearch is and how it helps power comprehensive cyber security solutions you can use for your organization. In some of our previous blogs, we’ve talked about our cloud-native Security Orchestration and Automation Response (SOAR) platform, ActiveEye. Part of the muscle behind this platform is Elasticsearch. Elasticsearch makes volumes of data… Read More

SOC-as-a-Service image

How to Determine if SOC-as-a-Service is Right for Your Organization

In today’s blog, we’ll explain what a Security Operations Center (SOC) is, and help you determine if a SOC-as-a-Service (SOCaaS) solution is right for your organization. Just because you’re tasked with managing cyber security for your company, it doesn’t mean your company is in business to do cyber security. Unless you’re a cyber security provider, your… Read More

G Suite Security Features image

New G Suite Security Features Protect Against Rogue Apps

In today’s blog, we’ll take a look at some new G Suite security features. These features are designed to prevent threats from unauthorized or rogue applications. Most of our customers have already adopted enterprise Software-as-a-Service (SaaS) applications or are evaluating them. The most popular ones are office automation suites like G Suite and Office 365. These cloud-based solutions… Read More

Lessons from Cyber Attacks image

Lessons from Cyber Attacks on Local Governments—Are You Protected?

More and more city and state governments are feeling the heat from ransomware attacks. In August 2019, 22 municipalities in Texas experienced this type of cyber attack and Baltimore was also hit by a ransomware attack in May that crippled the city’s computers. Cyber attacks on local governments aren’t slowing down, either. In this blog, we’ll cover lessons you… Read More

Endpoint Security image

Considering Next-Gen Endpoint Security? Where to Start

If you’re considering moving to a next-gen endpoint security solution, it can be confusing. You’ll find a wide range of options from multiple vendors that offer similar capabilities, which can make it difficult to know where to start. Next-generation endpoint detection and response (EDR) solutions are still relatively new, and the market is quite fragmented…. Read More