A Shifting Workforce: Protecting A Remote Workforce with Advanced Threat Intelligence

Posted by Erin Kennedy on Aug 4, 2020 7:54:49 AM

A Shifting Workforce: Protecting A Remote Workforce with Advanced Threat Intelligence for AWS and Azure

Read More

Topics: cybersecurity, managed security services, healthcare IT, IDS/IPS, intrusion detection, intrusion prevention, what is IDS/IPS, AWS, Azure, cloud

How MAXX Network Can Protect Your Cloud-Based Environment and Why You Should Care

Posted by Erin Kennedy on Jul 31, 2020 1:22:47 PM

Read More

Topics: cybersecurity, IDS/IPS, intrusion detection, intrusion prevention, AWS, Azure, cloud

Microsoft has released an update to address a critical remote code execution (RCE) vulnerability.

Posted by Erin Kennedy on Jul 15, 2020 5:39:37 PM

Microsoft has released an update to address a critical remote code execution (RCE) vulnerability, dubbed 'SigRed', in Windows DNS servers.

Read More

Topics: cybersecurity, cyber attack, microsoft, vulnerability, patch

15 Cybersecurity Statistics to Diagnose the Ailing Healthcare Industry

Posted by Erin Kennedy on May 1, 2020 1:04:03 PM

Healthcare CIOs, CISOs, and cybersecurity teams can't allow COVID-19 to distract from phishing scams, ransomware, rogue insiders and medical device hacks aimed toward employees, patients and data. 

Read More

Topics: cybersecurity, cyber attack, MSSP, healthcare, healthcare IT

Microsoft Warns This New Vulnerability Could Lead To The Next WannaCry

Posted by Jessica Grube on May 16, 2019 3:45:36 PM

Microsoft is warning that an exploit with the magnitude of the WannaCry attack that crippled computers worldwide two years ago could be imminent if people fail to patch a high-severity vulnerability. 

Read More

Topics: cybersecurity, cyber attack, wannacry, microsoft, vulnerability

Assessment Tool: Grade Your Banking Cybersecurity Operational Health

Posted by Alyssa McCord on Apr 23, 2019 6:00:00 AM

Threats are evolving and security operations are becoming increasingly more complex. Without the right people, process, and technology in place, threats could be imminent. But just how complex has it become?

Before we discuss our new Banking Cybersecurity Assessment Tool designed to grade your security operational health, let's take a look at a few of that facts related to the challenges facing security professionals today.

Read More

Topics: cybersecurity, banking, community bank, banking cybersecurity central

The Top Cybersecurity Best Practices To Follow In 2019

Posted by Jason Riddle on Apr 4, 2019 1:20:00 PM

Identifying and utilizing cybersecurity best practices is infinitely more complicated than it was a few years ago. Between constant patch updates, attacks that have never been seen before, and new compliance mandates, there’s a lot to balance while managing security operations. So, how can you ensure that your company is keeping up with the latest in cybersecurity best practices?

Read More

Topics: cybersecurity, incident response, data security, cybersecurity operations

Defeating Social Engineering Attacks: Cybersecurity Training Is Key

Posted by Jason Riddle on Apr 4, 2019 7:01:00 AM

Social engineering is an insidious – and highly successful – method of data theft. Training users to spot social engineering attacks is the key to beating them.

Read More

Topics: cybersecurity, cyber attack, data security, cybersecurity operations, social engineering

How To Break Down Your Organization's Cybersecurity Silos

Posted by Alyssa McCord on Apr 3, 2019 11:15:12 AM

A silo mentality is defined by the Business Dictionary as “a mind-set present in some companies when certain departments or sectors do not wish to share information with others in the same company.”

Although cybersecurity attacks and data breaches have become one of the biggest threats to businesses over the past several years, because cybersecurity is a relatively complex topic and a part of business that isn't directly tied to generating revenue, there’s often a disconnect between the boardroom and the IT room, resulting in cybersecurity silos.

Read More

Topics: cybersecurity, cybersecurity operations, managed security services

3 Key Features To Look For In A Managed IDS/IPS Solution

Posted by Alyssa McCord on Apr 2, 2019 1:57:45 PM

A managed IDS/IPS service is great for those who are looking for non-stop protection against cybersecurity attacks. In a world where cybersecurity attacks can occur at any moment, it pays to have a reliable IDS/IPS service that you can trust. In this blog post, we'll discuss what features to consider when evaluating IDS/IPS solutions.

Read More

Topics: cybersecurity, IDS/IPS, intrusion detection, intrusion prevention, what is IDS/IPS

Download Report

Cybersecurity Central

Knowledge is power.

When it comes to ever-changing advanced cybersecurity threats facing organizations today, knowledge is power. We're here to arm you with everything you need to know to become the security leader you strive to be.

Sign up for the CyberMaxx newsletter to stay up-to-date on:

  • The latest cybersecurity news
  • Need-to-know threat intelligence
  • Insight from industry leaders
  • And more

 

Subscribe Here!

Recent Insight