In-house or Outsourced? A Cost/Benefit Analysis Approach for Implementing SIEM

Log information and alert information management is a central part of any corporate cybersecurity program. Organizations rely on analyzing event data from various devices, applications, users, services, and security tools to identify anomalies and potential security threats. Security information and event management (SIEM) solutions enable companies to centrally store, analyze, and query security data from […]

Securing your Cloud Migration: Five Key Concerns with “Lift and Shift”

Moving systems and services to the cloud can provide numerous business benefits. Cloud environments offer greater scalability and flexibility than traditional on-premises environments and may be a more cost-effective solution as well. Software as a Service (SaaS) solutions also provide access to a wide range of specialized functions that aren’t practical to develop or maintain […]

SIEM and EDR: Better Together

Most organizations have an EDR (endpoint detection and response) platform in place, along with a SIEM (security information and event management) solution. But what’s surprising is that these businesses aren’t always setting up these systems to communicate with each other. If your EDR and SIEM solutions aren’t integrated, you may be missing out on information […]

Decoding the Cybersecurity Rainbow

A manager working with the managed security services provider.

Cybersecurity is a colourful industry. You’ve probably heard references to a rainbow of different team colours, white hats, and black boxes. This article helps cut through some of the confusion and explain what each colour means, how they affect your organization, and how you can leverage them for your benefit. Red, Blue, and Purple Teams […]

Managing Your MSSP Relationship

A Managed Security Service Provider (or “MSSP”) can be a powerful addition to your organization when properly integrated. Utilizing the variety of skills and roles an MSSP can offer your organization the ability to scale its capabilities and staffing more quickly than trying to do so in-house. However, fostering a successful relationship with your MSSP […]

Do Cybersecurity Certifications Meet Today’s Needs?

Would an engineer build a bridge without assessing the soil profile of where the footings will sit? Without understanding the materials that go into the construction of the bridge, without assessing external forces like wind and rain, without factoring in the load the bridge would need to handle at rush hour? Of course not. Why? […]

Top Four Considerations for IoT Security

How many IoT devices are on your network? Globally, there are an estimated 18 billion smart devices online, with that number expected to grow to nearly 40 billion by 2033. Of all those networked devices, about 40% serve as part of organizational operational technology (OT). All those IoT devices are leading to more maintenance headaches, […]

12th Annual ISA Cybersecurity Charity Golf Tournament

July 17, 2024 marked ISA Cybersecurity’s 12th Annual Charity Golf Tournament, and it was a major success! This year, our tournament was in support of ALS Action Canada and the ALS Super Fund. We were happy to support such an important cause while connecting with customers, partners, and friends in a fun day of golf. […]

Transforming Security: The Changing Role of Identity

In today’s world, network access is no longer restricted by time, location, or device. The traditional security perimeters have vanished. Now, identity stands as the keystone for accessing resources and services. Organizations that fail to recognize the change in the landscape are at serious risk. In fact, 90% of organizations in a 2024 survey reported […]

SUBSCRIBE

Get monthly proprietary, curated updates on the latest cyber news.