<img height="1" width="1" src="https://www.facebook.com/tr?id=205228923362421&amp;ev=PageView &amp;noscript=1">
  • 844-558-4782

CyberVista Blog

Threat Hunter - The Tracker

Threat Hunter - The Tracker What does it mean to be a Threat Hunter? With newsworthy breaches occurring nearly on a weekly basis, organizations need to pursuing precautionary strategies to minimize the possibility of a breach. Threat hunters combine research and analytical tools to iteratively comb through [...]
Read More

Aug 31, 2017

0

Why Corporate Leaders Should Follow China's Five Year Plan: Part 4

Why Corporate Leaders Should Read China’s Five Year Plan Welcome back to our series on the ties between corporate security and China’s Five Year Plan (FYP), which serves as the country’s national economic and policy roadmap. The FYP’s five key themes are Innovation, Coordinated Development, Green Growth, [...]
Read More

Aug 29, 2017

0

Penetration Tester: The Secret Agent

Penetration Tester - The Secret Agent What does it mean to be a Pentester? Do you ever wonder how threat actors are able to pull off a cybersecurity breach? If so, your curiosity is a good thing and there’s a high demand for cybersecurity professionals who think like you do.
Read More

Aug 24, 2017

0

Can Your Board Handle A Cyber Crisis

Can Your Board Handle A Cyber Crisis? By Susan Shultz, CEO of The Board Institute, and Jeff Welgan, Head of Executive Training Programs, CyberVista. It finally happened. Your company was hacked. Your customer data is for sale on the dark web, and, also, it is now publicly available on the Internet. How much does [...]
Read More

Aug 22, 2017

0

Student Spotlight: John Mattern, CISSP

Student Spotlight: John Mattern, CISSP Welcome back to CyberVista’s Student Spotlight Series. In this series we talk to newly-minted CISSPs who used the CyberVista system to earn their cert. This episode we talked with John Mattern, Infrastructure and Engineer Manager at Cigna Healthcare. The following interview [...]
Read More

Aug 17, 2017

0

Chief Information Security Selling Officer

12 Steps Every CISO Should Take To Earn Buy-In So you’re a Chief Information Security Officer? Things are looking up. The CISO position is escalating in terms of pay, credibility, and relevance within organizations year over year. According to ISACA’s State of Cybersecurity Report 2017, 65% of organizations now [...]
Read More

Aug 15, 2017

0

SOC Analyst - The Watchman

SOC Analyst - The Watchman What does it mean to be a SOC Analyst? The Security Operations Centers (SOC) is an organization’s cybersecurity panopticon. The SOC houses the surveillance team: highly-skilled analysts who monitor, detect, and remediate any security problems in an organization. You can’t see the SOC [...]
Read More

Aug 10, 2017

0

Business Lessons of the HBO Hack

Business Lessons of the HBO Hack What Happened Last week, HBO learned of the threat from beyond the Wall - or at least the firewall. On July 31, the entertainment giant confirmed that it had been the victim of a data breach; the same day, numerous reporters received an email, allegedly from the hackers [...]
Read More

Aug 8, 2017

0

Threat Intelligence Analyst: The Detective

Threat Intelligence Analyst - The Detective What Does It Mean To Be A Threat Intel Analyst? Across the country, there is likely not a large number of kids who respond to the question, "What do you want to be when you grow up?" with the response, “Threat Intel Analyst.” However, if those kids knew more about the [...]
Read More

Aug 3, 2017

0

A Place to Hang Your Hat at Black Hat 2017

A Place to Hang Your Hat at Black Hat 2017 Come on in to our living room! That’s right, this year our Black Hat booth wasn’t just a booth. It was a house. We welcomed attendees into our living room to showcase exactly how you can train for your certifications right from the comfort of your home. So take a seat on [...]
Read More

Aug 3, 2017

0

Rating Your Hospital’s (Cyber) Health

Rating Your Hospital’s (Cyber) Health It’s 2017. Do You Know Where Your Medical Records Are? The last thing on your mind when you or a loved one is in the hospital is cybersecurity. The security of medical records is something patients take for granted. In 2016, some 93 cyberattacks hit healthcare organizations. [...]
Read More

Aug 1, 2017

0