Search Results for: remediation plans Blog Post Tips for Creating an Effective Disaster Recovery Plan April 23, 2020 A Disaster Recovery Plan (DRP), a part of the Business Continuity Plan (BCP), describes how an organization handles a potential... Blog Post US Government to Offer up to $5,000 ‘Bounty’ to Hackers to Identify Cyber Vulnerabilities January 27, 2022 A bug bounty program is one where an entity (usually a company) offers up a cash reward for anyone who... Blog Post What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan... Blog Post Is IASME a viable alternative to ISO 27001 certification? July 15, 2021 ISO/IEC 27001 is considered by many to be the de facto international standard on how to manage information security. In... Page Ransomware Decryption and Bitcoin Payments August 6, 2018 LIFARS offers both proactive and reactive measures when facing ransomware. From advisory services and training to source detection and remediation,... Blog Post Here are The Top Cybersecurity Risks in Cloud Computing March 10, 2021 In the past few years, the demand for cloud computing has increased dramatically. However, the transition to the cloud has... Blog Post What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... Blog Post Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Blog Post Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand... Blog Post Cyber Security Plan for Industrial Control Systems March 10, 2020 What is an Industrial Control System? An industrial control system (ICS) is a control system that is associated with the... Blog Post What are Managed Security Services? March 17, 2020 Third-party providers offer Managed Security Services for the oversight and administration of a company’s security processes. Managed security service providers... Blog Post What is The EARN IT Act? March 23, 2020 The crime of child sexual assault has always been a problem that society hopes to combat. Recently, the US Congress... Blog Post Vulnerability Management For Your Organization May 7, 2020 A vulnerability is a weakness in internal controls that could be exploited by a threat to gain unauthorized access to... Blog Post How Much Do You Know About NIST Cybersecurity Framework? April 9, 2020 Faced with the threat of major cybersecurity incidents in recent years, in February 2013, US President Obama issued Executive Order...
Blog Post Tips for Creating an Effective Disaster Recovery Plan April 23, 2020 A Disaster Recovery Plan (DRP), a part of the Business Continuity Plan (BCP), describes how an organization handles a potential...
Blog Post US Government to Offer up to $5,000 ‘Bounty’ to Hackers to Identify Cyber Vulnerabilities January 27, 2022 A bug bounty program is one where an entity (usually a company) offers up a cash reward for anyone who...
Blog Post What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan...
Blog Post Is IASME a viable alternative to ISO 27001 certification? July 15, 2021 ISO/IEC 27001 is considered by many to be the de facto international standard on how to manage information security. In...
Page Ransomware Decryption and Bitcoin Payments August 6, 2018 LIFARS offers both proactive and reactive measures when facing ransomware. From advisory services and training to source detection and remediation,...
Blog Post Here are The Top Cybersecurity Risks in Cloud Computing March 10, 2021 In the past few years, the demand for cloud computing has increased dramatically. However, the transition to the cloud has...
Blog Post What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do....
Blog Post Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically...
Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...
Blog Post Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand...
Blog Post Cyber Security Plan for Industrial Control Systems March 10, 2020 What is an Industrial Control System? An industrial control system (ICS) is a control system that is associated with the...
Blog Post What are Managed Security Services? March 17, 2020 Third-party providers offer Managed Security Services for the oversight and administration of a company’s security processes. Managed security service providers...
Blog Post What is The EARN IT Act? March 23, 2020 The crime of child sexual assault has always been a problem that society hopes to combat. Recently, the US Congress...
Blog Post Vulnerability Management For Your Organization May 7, 2020 A vulnerability is a weakness in internal controls that could be exploited by a threat to gain unauthorized access to...
Blog Post How Much Do You Know About NIST Cybersecurity Framework? April 9, 2020 Faced with the threat of major cybersecurity incidents in recent years, in February 2013, US President Obama issued Executive Order...