As National Cyber Security Awareness Month (NCSAM) wraps up for 2019, we’d like to highlight one more concept: how to protect your digital profile. This goes along with this year’s NCSAM theme, “Own it. Secure it. Protect it.” We covered the first two topics in our previous posts on owning your digital profile and securing your digital profile. In this… Read More
[NCSAM Blog] How to Secure Your Digital Profile
October is National Cyber Security Awareness Month (NCSAM), which you can follow on Twitter using the hashtag #CyberAware. We’re excited to be a 2019 Champion! As we mentioned in our previous post about owning your digital profile, 2019’s theme is “Own it. Secure it. Protect it.” In this blog post, we’ll talk about how to secure… Read More
Security Automation in ActiveEye 2.0 Identifies and Resolves Threats Faster
Security automation is critical to identifying threats and resolving alerts faster. It plays a starring role in the latest release of our cloud-native Security Orchestration and Automation (SOAR) platform, ActiveEye 2.0. Here are just a few highlights of all the new features: Advanced security automation processes more than 95 percent of alerts, so our security operations… Read More
[NCSAM Blog] How to Own Your Digital Profile
October is National Cyber Security Awareness Month (NCSAM)! The theme for 2019 is “Own it. Secure it. Protect it.” This includes a focus on how to own your digital profile. NCSAM is centered around cyber security safety both at home and in the workplace and, as we mentioned in a previous blog, NCSAM was put together by… Read More
The Value of a Good Continuous Monitoring Strategy
Developing a continuous monitoring strategy is gaining a lot of momentum within many U.S. government agencies and businesses that want to better manage cyber security risk. As we mentioned in our previous blog, having a continuous monitoring plan enables you to see if your security controls are effective over time. While executing that plan can seem daunting,… Read More
Risks of Unstructured Data – How to Secure Your Data (Part II)
In part one of our blog series on the risks of unstructured data, we talked about some examples of unstructured data and the challenges it presents for security professionals. In part two, we’ll offer some tips on how to secure your data. Cleaning Up Unstructured Data SharePoint is a good place to start when cleaning up… Read More