12 Must-Know Steps to Vulnerability Management

12 Must-Know Steps to Vulnerability Management

As individuals, we take steps to protect ourselves; whether through insurance, credit monitoring, annual physicals, routine teeth cleanings, oil changes, or even applying a Band-Aid on an open wound.  Organizations deserve the same treatment approach to security....
Understanding and Managing Cyber Risk: A Three-part Framework

Understanding and Managing Cyber Risk: A Three-part Framework

White Paper – As the infrastructure we rely upon continues to become more diverse and our core business functions become decentralized in the drive to improve efficiency, it’s necessary to adjust the optic through which we understand and manage cybersecurity...
Insider Threat – NSA Breach Shows Why It Can’t Be Ignored

Insider Threat – NSA Breach Shows Why It Can’t Be Ignored

The recent indictment of a former National Security Agency (NSA) contractor charged with stealing highly classified documents and storing them in his home and car is the latest reminder that insider threat remains a significant risk to data security and organizational...

Cybersecurity in 2017 – a President’s Perspective

No, not the POTUS. We asked Secure Halo president Sean Doherty how cybersecurity has changed in the 10 years since he founded TSC, and what cyber threats will dominate in 2017. 1. You have a background in the military and national intelligence. What about...
4 Cybersecurity Resolutions Your Organization Should Keep

4 Cybersecurity Resolutions Your Organization Should Keep

With the New Year upon us, we are likely to face new cyber challenges that put the security of our organizations at risk. Despite these new concerns, there are steps you can take to become – or remain – cyber secure in an environment that continues to evolve. We asked...
Historic Cyber Breaches of 2016

Historic Cyber Breaches of 2016

This year has been historic for cyber breaches, both in the magnitude of attacks and in the number of people affected. With connectivity and automation steadily increasing, the likelihood of a breach – and the ease with which hackers can access vulnerable systems – is...