PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

Cybersecurity 2026 – Looking Five Years Ahead

Posted by Aaron R. Warner on Dec 30, 2020 11:13:31 AM

Technical Innovation Increases Cybersecurity Risk

New technologies help revolutionize all industries and the way they conduct business. Simultaneously, it increases blind spots that commonly open the door for exploitation by cybercriminals. As technical innovation rises exponentially, so too will the associated cybersecurity risk. New applications of AI are emerging on both the offensive and defensive side of the coin. AI can be trained to detect sophisticated threats and other anomalous activities, which help reduce the time from infection to detection; however, attackers will also continue to leverage this to their advantage. There are other examples: 5G, the continued fracturing of the xAAS into smaller and smaller constellations of services, and the embedding of increasingly complex technology into the human body. These innovations all create cybersecurity risks that will need to be addressed.

Read More

60 Days as a Cybersecurity Intern

Posted by Willie Zhang on Nov 23, 2020 12:04:11 PM

Your first day at a new internship can seem intimidating. For most of us, it’s our first look into the professional world. Although you learn important concepts in school, the experience you gain in a professional setting is much more valuable; especially in the cybersecurity industry. 60 days into my cybersecurity internship at ProCircular, the team has taught me much more than I’ve learned on my own. Before my time on ProCircular’s red team, I was only able to learn about cybersecurity concepts through internet resources, such as TryHackMe, and different books I found online. The opportunity to be an intern has enabled me to grow my skills and knowledge through hands-on experience with real companies around the country. Practicing vulnerability assessments and social engineering in an environment where it is legal is, by far, a great improvement compared to assessing my own home network. It’s exciting to see the different services that real companies have and the different ways those real companies try to secure them. It’s a much more engaging and volatile environment than what you get in online learning.

Read More

Topics: Cybersecurity, Company News

Investigating and Responding to Ryuk Cyberattack in 2020

Posted by ProCircular Team on Nov 18, 2020 10:30:00 AM

Incident Response is a series of investigative and remedial steps that a company takes in the event of a breach or other security incident. These restoration efforts can include backtracking through log data, isolating affected machines, and even negotiating with cyberterrorists!

Read More

Topics: Cybersecurity, Data Breach, Incident Response, security incident handling, security incident response

What is a Cybersecurity Consultant?

Posted by ProCircular Team on Oct 22, 2020 12:50:18 PM

How do you know if you have a solid cybersecurity program? You may have anti-virus installed and you change your computer password quarterly, but how do you know if your security program is truly effective? When you can’t see your gaps, it’s hard to make improvements and even harder to pick up the pieces after a security breach. That’s why Cybersecurity Consultants, like ProCircular’s Andrew Chipman, collect all the information they can, then measure your active security controls against their library of applicable standards.

Read More

Topics: HIPAA, Information Security, Data Protection, it risk assessment, DFARS, Manufacturing, risk

What is a SIEM Engineer?

Posted by ProCircular Team on Oct 15, 2020 10:03:08 AM

In 1974, the great Mohammed Ali said of his opponent, George Foreman, “His hands can’t hit what his eyes can’t see.” The same principle rings true in the cybersecurity world; we can't stop an attack until we know it is happening. That is why SIEM experts, like ProCircular’s Josh Resch, dedicate themselves to monitoring our clients’ networks for suspicious activity. Although each SIEM product works a little differently, they are all designed to help identify and track early signs of malicious activity on your network. A well-maintained SIEM can drastically reduce recovery time from a security incident by showing exactly where the attacker has been.

Read More

Topics: Cybersecurity, Network Security, security incident handling, SIEM, Monitoring

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates