What is a cybersecurity strategy and how can your business develop one?

April 9, 2021 | Mark Stone
Mark Stone

Mark Stone

Mark Stone is a content and copy writer with over a decade of experience covering technology, business, and cybersecurity. Earlier in his career, he was a cybersecurity analyst in the public sector. He lives in Kelowna, BC with his wife and two black cats.

April 9, 2021 | Mark Stone

What is a cybersecurity strategy and how can your business develop one?

This article was written by an independent guest author The number of users, devices, and resources on company networks is growing exponentially. With this expanding attack surface, a company’s assets, intellectual property, reputation, staff and customer data are all at risk. It’s no wonder cybersecurity has increased in prominence, with many organizations investing in more sophisticated…

March 26, 2021 | Mark Stone

SD-WAN vs. MPLS: how do they compare from a security perspective?

This article was written by an independent guest author. SD-WAN and MPLS are two technologies that are often perceived as either-or solutions. For many organizations, however, SD-WAN and MPLS can complement each other. This article will define and compare the technologies, explaining how, in many cases, they work together. We’ll also explore SD-WAN’s popularity and its…

Get the latest security news in your inbox.

Subscribe via email

RSS

March 18, 2021 | Mark Stone

What is a security operations center (SOC)? Explaining the SOC framework

This article was written by an independent guest author. If you’re responsible for stopping cyber threats within your organization, your job is more challenging than ever. The exposure to threats for any organization continues to escalate, and breaches are occurring every day. Consider: The average cost of a data breach is approximately $3.92M On average, it takes 280 days…

March 15, 2021 | Mark Stone

What is network segmentation? NS best practices, requirements explained

This article was written by an independent guest author. If you follow cybersecurity current events, you may know that the cost and frequency of a data breach continue to skyrocket. Organizations are constantly under attack, and the shift to remote work is only exacerbating the problem. According to IBM’s 2020 Cost of a Data Breach Report, most respondents are…

February 17, 2021 | Mark Stone

What is an incident response plan? Reviewing common IR templates, methodologies

This article was written by an independent guest author. In today’s threat landscape, it’s no longer if an incident will happen, it’s when. Defending your organization and having a plan for what to do if an incident occurs is more critical than ever. And frankly, the benefits of having an incident response plan are…

February 9, 2021 | Mark Stone

What is cybersecurity testing? Reviewing testing tools, methodologies for proactive cyber readiness

This article was written by an independent guest author. What does cybersecurity testing really mean? Your organization may boast all the best cybersecurity hardware, software, services, policies, procedures and even culture. If this is the case, you’re way ahead of the curve. But no matter how confident you are about your overall cybersecurity posture, how can you really…

January 29, 2021 | Mark Stone

What is Secure Access Service Edge? SASE Explained

This blog was written by a third party author Today’s “new normal” business environment is heavily focused on cloud. The ongoing trends we’re seeing today show no signs of letting up. Workloads moving to the cloud, an escalating number of devices accessing applications and data, and the more distributed nature of the workforce have…

December 7, 2020 | Mark Stone

What is a managed firewall? Benefits, offerings explained

This blog was written by a third party author A firewall can have all the security bells and whistles to keep the bad guys out, but firewalls are only as effective as the people managing them. To get the most out of a firewall, it must be properly managed to ensure it does what it’s supposed to: mitigate…

November 24, 2020 | Mark Stone

What is Third-Party Risk Management?

Creating and maintaining relationships with third parties brings about multiple risks. Whether your organization is large or small, it’s almost certain that you have business relationships with many third parties for specific types of operations. When operational data and confidential information are exchanged with third parties, that data and information are vulnerable to misuse and exploitation. This is…

November 17, 2020 | Mark Stone

What is unified endpoint management? UEM explained

This blog was written by a third party author. The business world is undergoing its most dramatic shift yet with the adoption of digital assets and workforce decentralization representing a huge business opportunity. These changes have led to added endpoints, or devices connecting to the network, and is enabling this transformation. But managing the volumes of these diverse endpoints and…

October 30, 2020 | Mark Stone

What is FedRAMP? Compliance and certification explained

This blog was written by a third party author The Federal Risk and Authorization Management Program (FedRAMP) is a compliance program established by the US government that sets a baseline for cloud products and services regarding their approach to authorization, security assessment, and continuous monitoring. The program’s governing bodies include the Office of Management and Budget (OMB), US…

October 29, 2020 | Mark Stone

Vulnerability scanning vs. Penetration testing: comparing the two security offerings

This blog was written by a third party author. It’s no secret: the number of security vulnerabilities organizations must contend with is overwhelming. According to a 2019 Risk Based Security report, there were 22,316 newly-discovered vulnerabilities last year. One Patch Tuesday disclosed a record number of 327 vulnerabilities in a single day. Just keeping up is becoming a monumental task. But…