When Peter Drucker produced his seminal work, “What Makes an Effective Executive,” in the Harvard Business Review (Drucker, June, 2004), he may not have been writing with cybersecurity in mind. In fact, in 2004, the cybersecurity world had only begun to appear as the many-headed beast it’s become since then. Nonetheless, this text is an excellent guide for executives about incident response and breach management.
Cybersecurity is a Team Sport: Peter Drucker on Cyber Attacks
Topics: Cybersecurity, budgeting, security incident handling
Technology is essential to modern business operations, but cybersecurity risks and data exposure threats come with that. Thankfully, a virtual chief information security officer (vCISO) can bring comprehensive strategic and operational leadership to security for companies that can only afford a part-time person in an executive cybersecurity role. Amid today’s industry-wide shortage of skilled security workers, vCISO could be the best option for finding and retaining critical security leadership.
Topics: Cybersecurity, vCISO
How to Choose the Best SIEM System: 5 Things to Consider
Security information and event management, or “SIEM,” is a tool that assimilates all of your log data to give you an all-encompassing overview of the activity on your network. SIEM tools watch over your network and help you stop trouble in its tracks. Whether your organization has 200 or 20,000 employees, SIEM software can be a vital part of any company’s cybersecurity posture.
Topics: Cybersecurity, Network Security, SIEM, Monitoring
Your first day at a new internship can seem intimidating. For most of us, it’s our first look into the professional world. Although you learn important concepts in school, the experience you gain in a professional setting is much more valuable; especially in the cybersecurity industry. 60 days into my cybersecurity internship at ProCircular, the team has taught me much more than I’ve learned on my own. Before my time on ProCircular’s red team, I was only able to learn about cybersecurity concepts through internet resources, such as TryHackMe, and different books I found online. The opportunity to be an intern has enabled me to grow my skills and knowledge through hands-on experience with real companies around the country. Practicing vulnerability assessments and social engineering in an environment where it is legal is, by far, a great improvement compared to assessing my own home network. It’s exciting to see the different services that real companies have and the different ways those real companies try to secure them. It’s a much more engaging and volatile environment than what you get in online learning.
Topics: Cybersecurity, Company News
Investigating and Responding to Ryuk Cyberattack in 2020
Incident Response is a series of investigative and remedial steps that a company takes in the event of a breach or other security incident. These restoration efforts can include backtracking through log data, isolating affected machines, and even negotiating with cyberterrorists!
Topics: Cybersecurity, Data Breach, Incident Response, security incident handling, security incident response