Current Topics and Information

Focused on the ever-changing information security landscape

Sub-header Photo

ACCUVANT BLOG

How To Survive Breach Failure (Part 3 of 3)

To effectively prepare for the possibility of a breach, it is paramount for your organization to have an effective incident response (IR) plan in place, and then stick to that plan if your organization does become under attack. But even if you successfully navigate through the incident, there are still several moments presented after a breach that are potential failure points for organizations. [...] Read more

Read more

How To Survive Breach Failure (Part 2 of 3)

Before an incident occurs , it is important for organizations to have a comprehensive incident response (IR) plan in place. In the chaos that arises during a breach, CISOs and security leaders need to avoid the natural tendency to drift from the established process, and make decisions that align with the formal IR plan. [...] Read more

Read more

How To Survive Breach Failure (Part 1 of 3)

Many organizations have developed security response procedures to satisfy compliance and regulatory requirements; however, when a breach does occur we regularly see organizations making decisions or performing actions that don’t align with the established incident response plan. [...] Read more

Read more

Protecting Against the Inevitable

Imagine this situation: you are sitting in your office, all is going well, when you receive an urgent invite for a due diligence committee meeting to potentially acquire another business. This isn’t the first time your company is evaluating acquisition targets; and then it hits you – the last time this happened your organization came under attack. [...] Read more

Read more

Know Your Firewall

Firewalls have been around for decades, and many organizations have had the same firewall technology in place for just as long. Even with the evolution of different security technologies now integrated into next generation firewalls, your firewall rules are not going away any time soon. [...] Read more

Read more

'Tis the Season for Phishing

It’s that time of year again, the holiday season. A time filled with friends, family, good food, and celebration. But of course it has its downsides as well; stress, debt, long lines and crowds. Many of us try to make the holiday shopping season a little easier by purchasing our gifts online in the safety and comfort of our homes. [...] Read more

Read more

Empowering the CISO

A security-focused business culture can empower the CISO to effectively perform their job, and allow them to become a respected member of the “C” level. As a result, they are able to implement a business-aligned security program that brings real value to the company. [...] Read more

Read more
(146 Results)