Why Organizations Should Look at Penetration Testing

Today’s blog is brought to you by Todd Palma.  Todd brings over a decade of technology sales experience to Brite.  Through working with organizations of all shapes and sizes, he has been able to identify and respond to market place trends.   Hackers and cyber thieves are getting more creative every day in an effort…

Read More

Raising the Bar on Cybersecurity: 10 New CounterACT® Features and Capabilities

Today’s blog is brought to you by our partner ForeScout.     Republished from ForeScout’s Blog Originally published on August 31, 2017 By Jennifer Geisler Vice President, Marketing Twitter: @GoGeisler   With the rapid influx and diversity of devices connecting to enterprise networks and the ever-evolving cybersecurity threat landscape, organizations are struggling to keep their physical…

Read More

The DFS Cybersecurity Regulation 23 NYCRR 500 Marathon

Today’s blog is brought to you by Trevor Smith, EVP of Sales and Marketing at Brite.  Trevor has 20 years of technology experience and a passion for problem solving with cutting edge technologies. Monday, August 28th, marked the first deadline in the New York Department of Finance Cybersecurity Regulation 23 NYCRR 500. There have been…

Read More

The New Age of Sharing Cybersecurity Data

Historically,  one of the largest obstacles for cybersecurity professionals to deal with was the lack of automated data sharing between legacy tools. This lack of communication drives a need for human intervention in sharing potential security risks data between tools and IT departments. Obviously, with the level of threats we see today this process is…

Read More

Endpoint Security: Everybody Needs Something

Cyber-attacks have become the norm. Organizations are aware of the ongoing threats day in and day out, but there is an undeniably scary trend. Prevention of attacks should be the priority, but too many organizations wait until they have been breached to implement the correct security tools. The question is, why is this happening and…

Read More

I Bet You Never Knew THIS About Clickbait

“How To Lose 10 Pounds FAST!” “You Will Never Guess What This Star Did” “22 Of the Cutest Animals Ever…. Wait to see #17” We have all seen titles like this.  They often populate the bottom section of relatively legitimate articles under the guise of “Related Content”.  With the effectiveness of Google tracking , there…

Read More

6 Ways Workload Automation Drives Digital Business

Today’s blog is brought to you by JAY BLINDERMAN and was originally posted on March 29th, 2017 by one of Brite’s partners, BMC.    If you want to investigate a new restaurant, check out a car repair service, or find a plumber, there’s a good chance that you might visit a third party consumer review site to see…

Read More

Where Has Your Data Gone?

In one day 3,776, 738 records are compromised. We all know the threat to data that ransomware, phishing emails and third party vendors present.  The news reminds us of it every day.  What is not so commonly mentioned is insider threats. Now, we are not claiming that all of your employees are trying to sabotage your business. Your…

Read More

Fasoo Sponsored Ponemon Institute Survey On NYDFS 23 NYCRR 500

Today’s blog is brought to you by our partner Ron Arden, Executive Vice President & COO of Fasoo who has a passion for cybersecurity, privacy and all things technology.  It was featured on the Fasoo Blog on March 21, 2017.   Fasoo sponsored a Ponemon Institute survey to determine the readiness of financial firms doing business…

Read More

Who is your weakest link?

We’ve all heard the phrase “You’re only as strong as your weakest link”. In the IT Security world the “weakest link” could end up costing an organization hundreds of thousands, if not millions of dollars. We do all we can to place the latest and greatest technologies at our perimeter, endpoints and everywhere in between to avoid having the next…

Read More