[Quiz] How Should You Deploy Your SIEM?

A Security Incident and Event Management (SIEM) tool ingests logs from your environment, correlates the data and can disseminate insights via alerting, visual dashboards or ...
Read More

The AAA Framework for Identity Access Security

The AAA Framework is a simple way to understand security issues surrounding the access ability of individuals within an organization. The Internet Engineering Task Force ...
Read More

GDPR and Brexit

The debate over Brexit is raging in Parliament. The outcome will have far-ranging impacts across the UK. If your business either sends personal data to another EU country or ...
Read More

Top 4 Things to Tell New Hires About Cybersecurity

The start of employment is the time to give new hires a run down on security measures for your company. Ideally, a formal training session should occur where protocols are ...
Read More

How SIM Card Hijacking Works

Last month a hacker who stole $5 million resulting from SIM Hijacking was sentenced to 10 years in jail. In the end, SIM Hijacking or SIM Swapping results in your phone number ...
Read More

How Blockchain Can Be Hacked: The 51% Rule and More

The infamous criminal Willie Sutton was once asked why he robbed banks, and his response was "because that’s where the money is." Blockchain technology and the related ...
Read More

Instant GDPR Best Practices Assessment

Since the General Data Protection Regulation (GDPR) went into effect in May 2018, many companies have been fined for failing to live up to the regulation. Google was recently ...
Read More

CIPHER Selected as Top 10 Best Performing MSSP

CIPHER is honored to be selected as a Top Managed Security Services Provider (MSSP) by Insights Success Magazine.
Read More