Blog Posts

Should I use Continuous Vulnerability Assessment?

When it comes to protecting your organization from cyber threats, one of the most important decisions you will make is whether or not to use continuous vulnerability assessment. A vulnerability assessment is a process of identifying, quantifying, and prioritizing (by using a risk management framework) the vulnerabilities in an organization's IT systems, applications and infrastructure.

Read More
soc, outsource, vendor, cybersecurity, defense Christian Grupp soc, outsource, vendor, cybersecurity, defense Christian Grupp

Do I need an outsourced SOC (Security Operations Center)?

When it comes to cybersecurity, one of the most important decisions a company can make is whether or not to outsource their Security Operations Center (SOC). An SOC is responsible for monitoring and analyzing a company's security systems to identify and respond to potential threats. While some companies choose to handle their SOC in-house, others opt to outsource this critical function to a third-party provider. There are pros and cons to both options, and ultimately, the decision of whether or not to outsource an SOC will depend on the unique needs and circumstances of your organization.

Read More

What are table-top exercises in cybersecurity?

Table-top exercises (TTX) in cybersecurity are a type of training that simulates real-world cyber threats and incidents. They are designed to help organizations prepare for and respond to cyber incidents by providing a controlled environment for employees to practice and test their incident response plans.

Read More

What goes into a Security Event Playbook?

A security event playbook is a comprehensive document that outlines the procedures and protocols that should be followed in the event of a security incident. It is a critical tool for organizations of all sizes and industries, as it helps to ensure that all relevant personnel are aware of the steps they should take to minimize the impact of a security incident.

Read More

What is a Security Event Playbook?

A security event playbook is a document that outlines the procedures and protocols that a company should follow in the event of a security incident. It is a set of guidelines that detail the steps that should be taken to detect, respond to, and recover from a security event, such as a cyber attack, data breach, or other security incident. This document is designed to be used by an organization's security team and other relevant personnel in the event of a security incident.

Read More
bcp, business continuity plan, defense, cybersecurity Christian Grupp bcp, business continuity plan, defense, cybersecurity Christian Grupp

What is a Business Continuity Plan?

A Business Continuity Plan (BCP) is a crucial document that outlines the procedures and processes a business should follow in the event of an unexpected disruption or disaster. This plan is designed to help ensure that the business can continue to operate and recover as quickly as possible. In this blog post, we will explore the key components of a BCP, including what should be included in one, and provide examples of the types of disruptions and disasters that a BCP can help a business prepare for.

Read More
hack, defense, cybersecurity Christian Grupp hack, defense, cybersecurity Christian Grupp

What is the chance I will be hacked?

As a small business owner, you may think that your organization is not likely to be hacked. However, small businesses are increasingly becoming targets for cyber criminals. In fact, according to a report from the National Cyber Security Alliance, 60% of small businesses go out of business within six months of a cyber attack. In this blog post, we will discuss the likelihood of small businesses being hacked, the average cost of a hack, and the risk-weighted cost that small businesses bear each year.

Read More
OWASP Top 10, defense, pentest, cybersecurity Christian Grupp OWASP Top 10, defense, pentest, cybersecurity Christian Grupp

What is the OWASP Top 10?

The OWASP Top 10 is a list of the most critical web application security risks that organizations face. The OWASP (Open Web Application Security Project) is a non-profit organization that is dedicated to improving the security of web applications and services. The OWASP Top 10 is updated every three years to reflect the current state of web application security risks. In this blog post, we will discuss the OWASP Top 10 and why it is important for organizations to be aware of these risks.

Read More
windows, cybersecurity, defense Christian Grupp windows, cybersecurity, defense Christian Grupp

Are All Windows Devices Insecure?

Windows devices, like any other technology, are susceptible to security threats. However, the idea that all Windows devices are insecure is a common misconception. In this blog post, we will discuss the security of Windows devices, the types of security threats that Windows devices face, and the steps that users can take to protect their devices and personal information.

Read More
apple, cybersecurity, defense Christian Grupp apple, cybersecurity, defense Christian Grupp

I use Apple devices, do I need to worry about security?

As technology becomes more integrated into our daily lives, it is important to consider the security of our devices. While Apple devices are known for their sleek design and user-friendly interface, it is not uncommon for users to question whether they need to worry about security. In this blog post, we will discuss the security of Apple devices and the steps that users can take to protect their devices and personal information.

Read More