Cybersecurity Technology
Cybersecurity Awareness Month
Your 2019 Cheat Sheet National Cybersecurity Awareness Month is the perfect time to take a step back and assess cybersecurity habits and practices. But rather than having to dig through hundreds of articles, we put together your 2019 Cybersecurity Awareness Month cheat sheet. Before we jump in, remember that there are plenty of things in life…
Read MoreIT Security: The Process That Never Stops
People, process and technology, when optimized together, are the three keys to improved IT security. To take it a step further, a successful security program is not one with an end-state, but rather one that is approached as a continuous orchestrated journey. Over time following a path will lead to success. If Rome wasn’t built…
Read MoreMaximizing Your Security Investments
by Trevor Smith, EVP at Brite Global information security spending continues to grow by double digits year over year and is expected to reach $124b in 2019. The combination of the digital transformation, emerging threats and new regulations are forcing organizations to focus on improving security practices. As a result, a portion of that spend has been…
Read MoreThe Top 5 Takeaways from the RSS 2019
The 2019 Rochester Security Summit is in the books! After a full two days of meeting and hearing from security leaders, Brite is excited to share the top 5 takeaways from the event. 1. Act Smarter, Not Harder Rapidly growing digital footprints and infrastructures are forcing IT department’s resources to be stretched thin. While the…
Read MoreThe First Building Block of a Strong Cybersecurity Plan
by Justin Smith – Brite, President and COO An effective cybersecurity plan is an intricate web of tools and systems working together. From firewalls and endpoints to on-premise technology and the cloud, the security footprint is expanding and when it comes to securing it you have to start somewhere. The somewhere? Visibility. Why do you…
Read MoreNew smart device? Make sure it’s secure before using
Before you start asking Alexa or Google who won the football game, changing the thermostat behind your partners back or starting a rave with the new color-changing lights you have a few to-dos to take care of to ensure your privacy isn’t being invaded by your new connected device. Over the decades, we have been…
Read MoreSecuring a Network: Illumio’s PCE
If you’ve been following our previous posts, then you might have picked up on a trending topic that is critical in today’s security landscape. Visibility. In case you missed the other posts or just need a recap to jog your memory – if you don’t know what’s on your network (either device, application or user), then you can’t fully…
Read MoreSecuring a Network: Gain Control of Network Traffic
We’ve said it a million times, everyone has said it a million times – threats are evolving, networks are becoming more dynamic and traditional security approaches are no longer enough. These days, the combination of the influx of connected devices and changes to networks, creates the necessity of having full visibility and the ability to take…
Read More4 tips if you’re a victim of identity theft
We have posted about how to protect yourself from identity theft, but even if you take all the proper precautions, your information could still end up in the wrong hands. If you become a victim of identity theft, here are some tips on what to do. Take action. As soon as you notice unauthorized charges,…
Read MoreSecuring a Network: Forescout’s Core Capabilities
A problem that plagues organization’s capability to achieve complete endpoint protection is the inability to identify every device connected to the network. In other words, organizations struggle to achieve full visibility. To help solve that problem, Forescout Technologies revolutionized device visibility with a proven process attained through agentless visibility. As discussed in this post, device visibility is essential to…
Read More