Training Ideas for Machine Learning in Security

If you’ve been evaluating new security tools, you’ve undoubtedly heard machine learning (ML) touted many times. It is fast becoming the backbone of all modern software, ...
Read More

CIPHER Named to Top 100 MSSPs of 2018 list as the Top 15 Worldwide

CIPHER ranks as a top 15 worldwide managed security service provider (MSSP) among the 100 most strategic and innovative according to MSSP Alert MSSP Alert, published by After ...
Read More

Placing More Importance on Data Security

The amount of data companies use and store has become so large and cumbersome that it is more difficult to correlate and control. Organizations are too often careless in their ...
Read More

Top SIEM Use Case Examples

Recent research indicates that up to 70 or 80% of SIEM deployments are driven by PCI DSS or other regulations. The following table shows a few example regulations that affect ...
Read More

Building Your Future Business with a SOC

Just as you wouldn’t give your house keys to someone you just met, organizations don’t want to do business with those they don’t trust. As digital transformation becomes the ...
Read More

Quick Tips for Developing an IR Plan

According to a cybersecurity resilience study, 77 percent of organizations surveyed lack proper incident response plans, while 69 percent report insufficient funding for cyber ...
Read More

Have Your Analysts See The Full Cyber Kill Chain

Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. ...
Read More

How To Create a Layered Security Defense Strategy

Take the time to learn about your assets. You'll be able to layer in multiple prevention and detection solutions and have a highly effective security architecture.  
Read More