Blog 7 1

Attorney-Client Privilege and Cybersecurity: What’s Changed and How to Adapt

What does the recent Eastern District of Virginia decision mean for your company when you need incident response services? What would have been a fairly straightforward question changed on May 26, 2020, with a court order issued in the Eastern District of Virginia? The Interpretation of Attorney-Client Privilege in Cybersecurity Is Changing In response to a March […]

62a0177e648cc3cc075ef18c 61dd06aa8480a1002bfd17c5 contactus hero bg

Death to Vulnerability Management As We Know It

Vulnerability Management concepts are changing. The idea that vulnerability management is limited to scanning alone is being replaced with a wider and more comprehensive view. It’s now transforming to a concept called vulnerability identification, which is an umbrella for any type of service or activity centered around identifying vulnerabilities. This can include scanning and penetration […]

61dcff353618a343aca223e7 Social 1 1024x311 1

Why a Proactive IR Strategy Is Critical

Breaches are a fact of life for every business. However, it is possible to stop breaches and improve your security posture by taking a proactive approach to your incident response (IR) strategy. The Risk of a Cyber Security Breach Continues to Increase Consider: A joint study by Ponemon Institute and IBM Security revealed the percentage chance of […]