security assessment services

2017 Threat Monitoring, Detection, and Response Survey: Take the Survey and Get the Free Report

Delta Risk has partnered with the Information Security Community on LinkedIn to examine the latest management trends, investment priorities, key challenges, and solutions preferences for incident response, threat hunting, threat detection, threat monitoring, insider threats, incident recovery, and more. Everyone who completes this comprehensive survey will receive a copy of the complete 2017 Threat Monitoring, Detection, and Response Report as… Read More

new york cyber security regulations

New York Cyber Security Regulations: Are You Ready to Implement 23 NYCRR 500?

March 1, 2017, marked the day that “23 NYCRR 500” (the New York Cyber Security Regulation) went into full effect for all New York Department of Financial Services (NYDFS) regulated individuals and organizations. These groups are required to adopt programs, policies, and procedures to protect their most sensitive information and assets from cyber security threats. With… Read More

command line

Cyber Handyman Skill #4: Get to Know and Love the Command Line to Simplify Your IT Tasks

In our previous blog in the series, “5 DIY Cyber Security Skills Every IT Professional Needs to Master,” I discussed the basics of coding and programming that every cyber handyman needs to know. Today, I’ll cover the command line, a cyber handyman’s best friend. I first thought about going the “Top X Most Useful Commands” route for this blog… Read More

Cyber Handyman Skill #2: How to Scan Your Network with Nmap

Two weeks ago, we introduced our “5 DIY Cyber Security Skills Every IT Professional Needs to Master” blog series. I discussed the first skill on the list, using virtual machines (VMs), and why they’re practically indispensable for simplifying day-to-day security tasks. Today, I’ll explain the importance of the network mapper, also known as nmap — a critical… Read More

diy cyber security skills

5 DIY Cyber Security Skills Every IT Professional Needs to Master

Introducing the Cyber Handyman If you’re a homeowner like me, hopefully you have a few basic around-the-house skills – changing a light bulb, fixing a loose door handle, unclogging a shower drain, making sure the deadbolts lock properly. I run into a new issue every week it seems. If you’re fortunate, there’s at least one… Read More

insider threat program

10 Steps for Establishing an Effective Insider Threat Program

Insider threats continue to be a concern for organizations. New research conducted by Crowd Research Partners, in coordination with the LinkedIn Information Security Group, reveals that 74 percent of organizations feel vulnerable to insider threats, while 54 percent of security professionals say insider threats are more common overall. Part of the problem is that most organizations… Read More