information security governance

Information Security Governance: 5 Tips for New CISOs [Cheat Sheet]

As a new Chief Information Security Officer (CISO), you’ve got a lot to juggle if you want to effectively address information security governance. There’s navigating internal politics and team dynamics, figuring out complex infrastructure and where cloud fits into your strategy, determining what compliance and regulatory requirements you have to meet, managing remote workers and… Read More

endpoint protection

Endpoint Protection: Enhancing the Carbon Black Experience with ActiveEye

We recently announced our expanded partnership with VMware Carbon Black for improved endpoint protection. Our technical integration, via our ActiveEye portal, delivers managed detection and response (MDR) capabilities that enable us to be much more responsive and go beyond basic prevention, especially when it comes to endpoint protection. In this blog, I’ll dive deeper into… Read More

Supply Chain Risk

The Future of Supply Chain Risk: Are You Prepared?

Massive events like the coronavirus (COVID-19) and trade wars between the U.S. and China are disrupting the entire global economy, including the supply chain. Analysts such as Mark Zandi, Chief Economist at Moody’s Analytics, are making dire predictions when it comes to coronavirus and its impact on world financial markets. Meanwhile, even before the current… Read More

Microsoft Defender ATP and ActiveEye Integration Makes it Easier to Detect Threats

Earlier this week we announced that Microsoft Defender ATP is now integrated with our cloud-native Security Orchestration and Automation (SOAR) platform, ActiveEye. In today’s blog, I wanted to share a bit more context about what this means from a practical perspective.    Adding support for Microsoft Defender Advanced Threat Protection (ATP) is part of our… Read More

SOC-as-a-Service webinar

Delta Risk to Host Webinar on Detecting, Investigating, and Resolving Threats Faster with SOC-as-a-Service

How can you protect your organization from cyber security threats with today’s ever-expanding attack surface? With so many security solutions on the market that require time and expertise to evaluate, deploy, and maintain, and a scarcity of people with the skills to do so, how do you manage it all? Join Delta Risk Wednesday, March… Read More