Managing Your MSSP Relationship

A Managed Security Service Provider (or “MSSP”) can be a powerful addition to your organization when properly integrated. Utilizing the variety of skills and roles an MSSP can offer your organization the ability to scale its capabilities and staffing more quickly than trying to do so in-house. However, fostering a successful relationship with your MSSP […]

Do Cybersecurity Certifications Meet Today’s Needs?

Would an engineer build a bridge without assessing the soil profile of where the footings will sit? Without understanding the materials that go into the construction of the bridge, without assessing external forces like wind and rain, without factoring in the load the bridge would need to handle at rush hour? Of course not. Why? […]

Top Four Considerations for IoT Security

How many IoT devices are on your network? Globally, there are an estimated 18 billion smart devices online, with that number expected to grow to nearly 40 billion by 2033. Of all those networked devices, about 40% serve as part of organizational operational technology (OT). All those IoT devices are leading to more maintenance headaches, […]

12th Annual ISA Cybersecurity Charity Golf Tournament

July 17, 2024 marked ISA Cybersecurity’s 12th Annual Charity Golf Tournament, and it was a major success! This year, our tournament was in support of ALS Action Canada and the ALS Super Fund. We were happy to support such an important cause while connecting with customers, partners, and friends in a fun day of golf. […]

Transforming Security: The Changing Role of Identity

In today’s world, network access is no longer restricted by time, location, or device. The traditional security perimeters have vanished. Now, identity stands as the keystone for accessing resources and services. Organizations that fail to recognize the change in the landscape are at serious risk. In fact, 90% of organizations in a 2024 survey reported […]

Unveiling Hidden Threats: Proactive Strategies to Defend Against Supply Chain Cyber Threats

About the Author Ruchir Kumar is our Senior Director, Architecture and Protection. He is a globally-respected cyber leader with over 15 years of experience successfully delivering advisory and implementation engagements across North America, Europe and Asia. He brings a unique blend of consulting and industry experience, with successes spanning across diverse industry sectors (e.g., Crown/federal […]

The Top 6 Security Awareness Training Program KPIs and Metrics

About the author: Huda Ali has a passion for security awareness. In her role as Protection Services Team Lead at ISA Cybersecurity, she guides her team in delivering compelling security awareness programs for internal and external stakeholders alike. Her leadership abilities, proven teamwork skills, and extensive cybersecurity experience combine to help our customers develop a […]

SIEM vs. XDR: What’s Right for You?

security operations team sitting in SOC reviewing work

SIEM (Security Information and Event Management) and XDR (Extended Detection and Response) are two technology solutions at the forefront of any conversation about cybersecurity. But what’s the difference between SIEM and XDR, which one is right for you, and how do you best implement them? In this article, we demystify these technologies to help you […]

My ALS Story by Mark Kirton

Image of Mark Kirton at this computer

Every young boy growing up in the prairies, skating on a frozen pond, dreams of playing for the NHL.   I lived that dream from 1978 to 1988, playing for Toronto, Detroit and Vancouver.  I still remember stepping on the ice that first shift in Toronto, and when I scored a goal, I swear my feet […]

SUBSCRIBE

Get monthly proprietary, curated updates on the latest cyber news.