Request a cybersecurity demo from DefenseStorm

Need more information or a product demo?

Cybermind

Covering all things cybersecurity

Equifax Breach – Bank Impact

09/19/17

Alex Hernandez - VP of Customer Solutions | Praesidio While most of the discussion about the Equifax data breach has been around the impact to individuals and protecting their personal credit, I want to discuss the impact to our banks and how we need to review and potentially update our policies and controls as an organization knowing the potential information that can be leveraged by hackers.
Read more

National Resume Month

09/05/17

Are you wondering what updating your resume has to do with cyber security? Well, quite a lot actually. While resumes are used to attract recruiters and potential employers, they also attract some unwanted guests - hackers. Due to the amount of personal information on a resume, they are perfect for s...
Read more

soft in the middle

08/28/17

Many small to medium businesses employ network topologies with a “hard, crusty” exterior, but have a soft center or core. These networks employ firewalls and intrusion detection/prevention systems on the edge to keep out cybercriminals and script kiddies which are seen to be the most prominent threa...
Read more

SOC 2

08/21/17

One of the most important ways DefenseStorm demonstrates to its customers the security, confidentiality, availability and processing integrity of the Data Security Platform is by complying with the rigorous SOC 2 framework.  SOC stands for ‘Service Organization Controls’ and is governed by the AICPA...
Read more

Hurricane of cyber alerts

08/03/17

Part of penetration testing is the testing of applications. This is an important aspect of penetration testing because it allows you to test the applications used on your network and throughout your company. It includes the testing of web and standard apps, looking for vulnerabilities, and even some...
Read more

Penetration Testing

07/26/17

Penetration testing is a simulated scenario of potential network breaches.  It does not take down any systems or infrastructures. You hire a third party to come in and safely attempt to access your network using both internal and external sources. They act as a hacker would, trying to gain access to...
Read more

Q2 Threat Report

07/19/17

The second quarter of 2017 saw of the most severe cases of ransomware to date – WannaCry and NotPetya – surpassing the gravity of most other security news in that timeframe.  Ransomware continues as a leading cyberattack vector and cybersecurity experts tend to agree that these attacks will conti...
Read more

NOT SURE YOU'RE SECURE?

Request Your Complimentary Assessment
Grab our latest eBook - Security Data Platform Webinar on October 12th - Space is limited!