Cysiv Tips for Preparing an RFP for SOC-as-a-Service

A 24/7 security operations center (SOC) is increasingly being recognized as an essential part of an effective cyber security strategy. The primary function of a SOC is to identify, investigate, and resolve threats that target critical infrastructure, sensitive data,...

Email Security 3.0

Disrupt Disruption with a Comprehensive 3-Zone Email Security Strategy Business leaders are worried about and actively planning for disruption. Even with the most sophisticated protections in place, it’s impossible to fully predict where disruption will originate....

The Perfect Score

The Perfect Score: Key Scoring Requirements for Measuring Third Party Risk  Today’s CISOs are tasked with the challenge of  limited funds and resources to focus on high priority cybersecurity projects, ranging from breach detection and response to managing the third...
Value-Added Reselling, It’s What We Do

Value-Added Reselling, It’s What We Do

At the moment the world is abuzz, if you will pardon the pun, with COVID-19 and now the next threat in what seems like a monkey paw year, Murder Hornets. But with these seemingly apocalyptic natural occurrences, where does that leave infosec? What are we doing? How...
Password Rumble

Password Rumble

Passwords- the dark necessity of the world, the prize of many bad actors, the security measure that drives users and security professionals alike insane. Special characters, 16 characters, 8 characters, use a passphrase, don’t use a passphrase they are easily...