New York SHIELD Act Compliance Tips

New York SHIELD Act Compliance Tips

At the beginning of the year, we talked about the New York SHIELD Act compliance and the steps companies had to take.  In the shuffle of recent events, the compliance date has come and gone for many without the proper actions in place. With the coupling of legal implications of non-compliance and the developing security vulnerabilities from…

Read More

CVE Management: Removing CVEs Swept Under the Rug

CVEs Swept Under Rug

IT leadership builds and manages strong, diverse teams to ensure secure and stable operations. However, sometimes departments overlap resulting in confusion and miscommunication. Such is the case with networking and security departments when it comes to CVE management. It is important to address responsibility early on. Who should be held accountable for any unpatched known…

Read More

3 Critical Services Every MSP Should Offer

managed service provider

Managed security providers vary vastly with how they do business and what they offer. It is often challenging to compare providers if you are in the market for an MSP. On the surface, most MSPs offer a basic level of IT management and help desk. When you dig a little deeper, comparing providers is really…

Read More

Understanding Risk-based Vulnerability Management

Understanding Risk-based Vulnerability Management

Devices, tools and users are constantly being added to your network and widening the attack surface.  Every new addition adds another possibility for misconfiguration and vulnerabilities. The longer a vulnerability goes undetected, the greater the risk. Sound familiar? Security teams across industries all live this reality every day. That’s where risk-based vulnerability management can help.…

Read More

BTS: The 45-day BriteProtect Onboarding Process

Blog graphic with image of people and processes with title "Behind the scenes: The BriteProtect Onboarding Process"

45-60 days. That’s all it takes to get truly onboarded with the BriteProtect managed security service. Brite qualifies onboarding as log collection, true correlation and meaningful detection and response, not just signing a contract. How? Connectors and AI correlation are the two major reasons we consistently meet this expectation. Connectors are custom API connections that…

Read More

Forescout 8.2 Deep Dive: Cloud-First Deployments

Forescout’s 8.2 update introduced a handful of highly anticipated features including a new web-based interface with dashboard upgrades and the eyeExtend Connect App ecosystem.  The final feature we want to breakdown in the Forescout 8.2 update is the cloud-first deployment capability.   Before 8.2, device visibility and control were limited for organizations with a cloud-first approach,…

Read More

New York SHIELD Act: Everything You Need to Know

Yesterday, we teamed up with RDG+ Partners and Harter Secrest and Emery LLP to explore how business will be affected by the New York SHIELD Act.  In case you couldn’t make it, or want the highlights, here’s a recap and the biggest takeaways.  Rundown of the New York SHIELD Act.  First, let’s understand the SHIELD Act.  It stands for ‘Stop…

Read More

Why Organizations Should Look at Penetration Testing

Today’s blog is brought to you by Todd Palma.  Todd brings over a decade of technology sales experience to Brite.  Through working with organizations of all shapes and sizes, he has been able to identify and respond to market place trends.   Hackers and cyber thieves are getting more creative every day in an effort…

Read More

The Challenge of Securing Hybrid Clouds and SDDC’s

With the advancement of technology, it has never been easier for organizations to expand their datacenter. This has been made possible by the introduction of public cloud computing and the Software-defined Data Center (SDDC). However, with this ease of use and network sprawl an inherit Cybersecurity issue has arisen. Securing these methods of computing has…

Read More