<img height="1" width="1" src="https://www.facebook.com/tr?id=205228923362421&amp;ev=PageView &amp;noscript=1">
  • 844-558-4782

CyberVista Blog

Security Auditor - The Inspector

Security Auditor - The Inspector What does it mean to be a Security Auditor? In order to preserve the integrity of information security processes and procedures, organizations must employ several rounds of review and checks related to cybersecurity. Often these reviews come from an external or an internal [...]
Read More

Sep 27, 2017

0

Cybersecurity Architect - The Mastermind

Cybersecurity Architect - The Mastermind What does it mean to be a Cybersecurity Architect? In cybersecurity, many roles are definitively specialized. Individuals often are labeled subject matter experts (SMEs) on certain aspects of platforms, threats, vulnerabilities, operations, or procedures. Yet, an [...]
Read More

Sep 27, 2017

0

Equifax - What Were They Thinking?

Equifax - What Were They Thinking? Or rather, what do you hope the Equifax board was thinking in March, May, July, and September? We have the timeline of the perceived facts of the Equifax breach.  We know what the company announced publicly. But it makes us wonder what the Equifax Board was thinking?  What do we [...]
Read More

Sep 26, 2017

0

Malware Analyst - The Bomb Squad

Malware Analyst - The Bomb Squad What Does It Mean To Be A Malware Analyst? Imagine the detonation of an explosive digital bomb, undoing thousands of hours of hard work and reducing your organization’s network to a pile of binary rubble. You or your team members didn’t even realize the weapon was within your [...]
Read More

Sep 21, 2017

0

The Value of Cybersecurity Tabletop Exercises for Leadership Teams

The Value of Cybersecurity Tabletop Exercises for Leadership Teams The lessons learned from cybersecurity tabletop exercises will minimize the impact of your organization’s next data breach. If the adage is correct and success is 90% preparation and 10% perspiration, then will a cybersecurity tabletop exercise [...]
Read More

Sep 19, 2017

0

Vulnerability Management Analyst - The EMT

Vulnerability Management Analyst - The EMT What does it mean to be a Vulnerability Management Analyst? The cliche, “You are only as strong as your weakest link,” is particularly true for the field of vulnerability management. Vulnerabilities are the entryways by which threat actors enter and then wreak havoc [...]
Read More

Sep 14, 2017

0

How to Calculate ROI on Cybersecurity Investment

How to Calculate ROI on Cybersecurity Investment By Tom Kellermann, CEO, Strategic Cyber Ventures As a Chief Information Security Officer, you have the unenviable responsibility of presenting cybersecurity investment plans for the future while facing scrutiny of such investments from some stakeholders and [...]
Read More

Sep 12, 2017

0

The Farmer and the Equifax

The Farmer and the Equifax In the wake of the Equifax consumer data breach, many of the stories in the past days share well-articulated insights that are nonetheless written with that full 20/20 hindsight in play. There even is evidence that Equifax itself took this path two years ago in the wake of the Experian [...]
Read More

Sep 11, 2017

0

How Not To Be One of the Six Million Instagram Hacked Accounts

How Not To Be One of Six Million Instagram Hacked Accounts What Happened? Instagram, social media’s beloved photo and video sharing app to more than 700 million monthly users, suffered a significant data breach last week. Originally, the hack seemed to be solely focused on gaining access and exploiting the [...]
Read More

Sep 7, 2017

0