Blog
By Ben Canner
What is open source cybersecurity? How can your enterprise deploy it for maximum efficiency? What are the 5 top best practices for open source cybersecurity? Previously, Solutions Review offered our list of the top Open Source SIEM tools for enterprises. Open source tools open their cybersecurity designs for public modification
By Elliot Forsyth
Manufacturers are increasingly under threat from cyberattacks. This is a real concern not just because of the typical business vulnerabilities (e.g., stolen intellectual property, ransomware) but because in today’s increasingly connected world, a successful infiltration from a cybercriminal could shut down a plant’s operations or start making equipment produce faulty
Don’t Miss These 10 Cybersecurity Blind Spots
June 27, 2019
0 Comment
By Caroline Wong
I began my career in information security in 2005. Since that time, I’ve led practitioner teams at eBay and Zynga, led a global product management team at Symantec and performed management consulting engagements at Cigital. I’m currently the chief security strategist at Cobalt.io, a pentest as a service company. Over
Drafting an Appropriate Cybersecurity Policy
June 26, 2019
0 Comment
By CHLOE BENNET
Cyber threats, cyberattacks, and hacks are getting more and more common so companies are forced to invest in cybersecurity systems. Even though your business may have an excellent cybersecurity plan, you’re still at risk of being attacked; it’s simply the reality of today’s world. That’s why you need to be
Cybersecurity Defense Begins With Awareness
June 26, 2019
0 Comment
By Danny Pehar
I’ve been in the cybersecurity industry for most of my adult life, and throughout that time, I’ve had the pleasure of working with some of the best digital forensics experts in the world. Digital forensics experts are the people who get called in after a cyber breach to figure out