Cybersecurity Technology
The DFS Cybersecurity Regulation 23 NYCRR 500 Marathon
Today’s blog is brought to you by Trevor Smith, EVP of Sales and Marketing at Brite. Trevor has 20 years of technology experience and a passion for problem solving with cutting edge technologies. Monday, August 28th, marked the first deadline in the New York Department of Finance Cybersecurity Regulation 23 NYCRR 500. There have been…
Read MoreThe New Age of Sharing Cybersecurity Data
Historically, one of the largest obstacles for cybersecurity professionals to deal with was the lack of automated data sharing between legacy tools. This lack of communication drives a need for human intervention in sharing potential security risks data between tools and IT departments. Obviously, with the level of threats we see today this process is…
Read MoreEndpoint Security: Everybody Needs Something
Cyber-attacks have become the norm. Organizations are aware of the ongoing threats day in and day out, but there is an undeniably scary trend. Prevention of attacks should be the priority, but too many organizations wait until they have been breached to implement the correct security tools. The question is, why is this happening and…
Read MoreI Bet You Never Knew THIS About Clickbait
“How To Lose 10 Pounds FAST!” “You Will Never Guess What This Star Did” “22 Of the Cutest Animals Ever…. Wait to see #17” We have all seen titles like this. They often populate the bottom section of relatively legitimate articles under the guise of “Related Content”. With the effectiveness of Google tracking , there…
Read More6 Ways Workload Automation Drives Digital Business
Today’s blog is brought to you by JAY BLINDERMAN and was originally posted on March 29th, 2017 by one of Brite’s partners, BMC. If you want to investigate a new restaurant, check out a car repair service, or find a plumber, there’s a good chance that you might visit a third party consumer review site to see…
Read MoreWhere Has Your Data Gone?
In one day 3,776, 738 records are compromised. We all know the threat to data that ransomware, phishing emails and third party vendors present. The news reminds us of it every day. What is not so commonly mentioned is insider threats. Now, we are not claiming that all of your employees are trying to sabotage your business. Your…
Read MoreFasoo Sponsored Ponemon Institute Survey On NYDFS 23 NYCRR 500
Today’s blog is brought to you by our partner Ron Arden, Executive Vice President & COO of Fasoo who has a passion for cybersecurity, privacy and all things technology. It was featured on the Fasoo Blog on March 21, 2017. Fasoo sponsored a Ponemon Institute survey to determine the readiness of financial firms doing business…
Read MoreWho is your weakest link?
We’ve all heard the phrase “You’re only as strong as your weakest link”. In the IT Security world the “weakest link” could end up costing an organization hundreds of thousands, if not millions of dollars. We do all we can to place the latest and greatest technologies at our perimeter, endpoints and everywhere in between to avoid having the next…
Read MoreIoT: Securing the Unknown
Technology is an ever-changing field. The world has become more and more dependent on technology to get us through our daily tasks. While this has made life easier for most people and businesses, it also creates more security issues. The main issue with IoT devices is the security, or lack thereof. Whether it is a refrigerator, TV or…
Read MoreThe Challenge of Securing Hybrid Clouds and SDDC’s
With the advancement of technology, it has never been easier for organizations to expand their datacenter. This has been made possible by the introduction of public cloud computing and the Software-defined Data Center (SDDC). However, with this ease of use and network sprawl an inherit Cybersecurity issue has arisen. Securing these methods of computing has…
Read More