Under Attack? Contact Us
Reading Time: < 1 minutes What is a third-party – vendor-risk – assessment, how are they done, and does your organization need to invest in one?
Reading Time: < 1 minutes Senior Technical Program Mngr gives comprehensive advice and resources to help loved ones protect elders from hackers and scammers.
Reading Time: < 1 minutes What a IT risk assessment is, what different types of assessments exist, and how to ensure an assessment is effective and successful.
Reading Time: < 1 minutes New individual state privacy regulations in 2023 can be a confusing and daunting landscape to maneuver. Cyber Defense Group sheds some light on what you can do to keep your organization compliant with multiple privacy laws across the map.
Reading Time: < 1 minutes Soc-2 and ISO 27001 are two of the most common cybersecurity compliance audit options. What do they entail, what is the difference between them, and how to best execute.
Reading Time: < 1 minutes The California Privacy Rights Act’s January 2023 compliance deadline is almost here. Are you confident you are CPRA compliant? We breakdown what CPRA is, how it differs from CCPA and what it all means for individuals and organizations.
Reading Time: < 1 minutes CDG’s technical response to the Log4j2 exploit: who is affected and how to remediate.
Reading Time: < 1 minutes The importance of cloud computing to modern organizations, why it is cost-effective and the better for data security and protection.
Reading Time: < 1 minutes 1st Segment of CDGs engineering team’s news and insights:
Reading Time: < 1 minutes Engineering corner – Dir of Engineering discusses why monitoring from the outside in is critically important: “If you can see it, you can do something about it”
Reading Time: < 1 minutes The best way to stop hackers is to think like them. How CDG’s hacker mentality gives us the creative edge to protect organizations from cyber incidents and breaches.
Reading Time: < 1 minutes What a IT risk assessment is, what different types of assessments exist, and how to ensure an assessment is effective and successful.
Reading Time: < 1 minutes Why it is important to build security into products and development rather than tacking it on when needed.
Reading Time: < 1 minutes What to look for and the questions to ask when hiring an external cybersecurity team.
Reading Time: < 1 minutes 4 Steps to maximize value on your cybersecurity tools and relieve vendor overload.
Reading Time: < 1 minutes Why ransomware ran rampant across the healthcare industry at the beginning of the Covid-19 pandemic.
Reading Time: < 1 minutes The why, what, how, how often and how much of Cyber Risk Assessments.
Reading Time: < 1 minutes The Top 5 Reasons Investing in Cybersecurity is Best Practice for Businesses
Reading Time: < 1 minutes The best way to stop hackers is to think like them. How CDG’s hacker mentality gives us the creative edge to protect organizations from cyber incidents and breaches.
Reading Time: < 1 minutes What are ransomware attacks, why are they such a looming threat to organizations of every size, and how to approach ransomware recovery using your incident response plan.
Reading Time: < 1 minutes What a cybersecurity risk assessment is, why your organization should invest in one, and the factors that calculate the return on that investment.
Reading Time: < 1 minutes Today just about every organization is a cloud-reliant organization and cybersecurity can be vital to success. Here’s how to create a cybersecurity budget and how to make cybersecurity cost effective.
Reading Time: < 1 minutes In 2016, frustrated with the outdated, template-driven approach to cybersecurity, I was inspired to create a different kind of cybersecurity consultancy.
Reading Time: < 1 minutes What a IT risk assessment is, what different types of assessments exist, and how to ensure an assessment is effective and successful.
Reading Time: < 1 minutes The why, what, how, how often and how much of Cyber Risk Assessments.
Reading Time: < 1 minutes What is a cybersecurity assessment? What does it entail? Learn how Cyber Defense Group’s team of humans will guide you through the process of a comprehensive personal and holistic review of your organization’s security risks, vulnerabilities and gaps.
Reading Time: < 1 minutes What a cybersecurity risk assessment is, why your organization should invest in one, and the factors that calculate the return on that investment.
Reading Time: < 1 minutes What is a third-party – vendor-risk – assessment, how are they done, and does your organization need to invest in one?
Reading Time: < 1 minutes CDG’s technical response to the Log4j2 exploit: who is affected and how to remediate.
Reading Time: < 1 minutes Cybersecurity lessons learned and forecast in the wake of Zoom’s security fallout at the beginning of the Covid-19 shut down.
Reading Time: < 1 minutes Senior Technical Program Mngr gives comprehensive advice and resources to help loved ones protect elders from hackers and scammers.
Reading Time: < 1 minutes CDG’s disects lessons learned after the SolarWinds breach and how enterpise organizations can impove their cybersecuity postures.
Reading Time: < 1 minutes Covid’s overwhelm on the heathcare industry and the unprecedented need for telehealth created a interwoven relationship between HIPAA and cloud computing/privacy compliance regulations.
Reading Time: < 1 minutes Why ransomware ran rampant across the healthcare industry at the beginning of the Covid-19 pandemic.
Reading Time: < 1 minutes New individual state privacy regulations in 2023 can be a confusing and daunting landscape to maneuver. Cyber Defense Group sheds some light on what you can do to keep your organization compliant with multiple privacy laws across the map.
Reading Time: < 1 minutes Why paying ransomware ransoms is detremental to all organizations and best practices if you experience a ransomware incident.
Reading Time: < 1 minutes CDG CEO Lou Rabon’s advice to organizations to help understand and recover from the SolarWinds breach. Video included.
Reading Time: < 1 minutes CDG reacts to the “Shields Up” cyber defense alert in the days following Russia’s invasion of Ukraine giving general and specific cyber hygiene actions organizations can take immediately to secure their environments.
Reading Time: < 1 minutes Here’s a list of mistakes organization are making that leave CISOs frustrated and ineffective and what they could do instead.
Reading Time: < 1 minutes After a very busy season of working overtime to respond to emergency incident responses, CEO Lou Rabon gives his two cents on the #1 thing organizations should be doing to avoid cyber incidences.
Reading Time: < 1 minutes The cybersecurity employment gap, the challenges facing women in cybersecurity, cybersecurity job misconceptions, and the underestimation of women’s tech saavy have all led to a stagnation for women in cyber.
Reading Time: < 1 minutes Covid-19’s stay at home culture created a rushed increase in cloud computing and eCommerce. Why a bigger digital economy calls for more cybersecurity investment.
Reading Time: < 1 minutes CDG’s open letter at the beginning of the Covid 19 shutdown on cybersecurity best practices for organizations forced to move to remote working.
Reading Time: < 1 minutes Why trust, team building, and human relations are vital to proactive cybersecurity.
Reading Time: < 1 minutes CDG’s expert cybersecurity advice in reaction to Zoom security issues when they were happening early on during the Covid-19 shutdown.
Reading Time: < 1 minutes An Incident Response Team monitors and mitigates all IR activities across an organization and can be the difference between business shut down and business as usual. Here’s how to build a team and IR process.
Reading Time: < 1 minutes CDG’s general council breaks down CCPA requirements and how you can ensure your organization is compliant.
Reading Time: < 1 minutes What are containers and why container security is vitally important to your development and operations.
Reading Time: < 1 minutes What is Cyber-Threat Modeling? Methodologies, best practices and next steps to adopting a proactive security posture.
Reading Time: < 1 minutes A technical breakdown of how to create a cybersecurity alert framework to keep cybersecurity teams focused during an incident.
Reading Time: < 1 minutes What is DevSecOps and why it is becoming more and more critical to build cybersecurity in at your development stage.
Reading Time: < 1 minutes Endpoint security concerns monitoring, protection, and restriciton of endpoints – How do you secure them and why is it important?
Reading Time: < 1 minutes The importance of cloud computing to modern organizations, why it is cost-effective and the better for data security and protection.
Reading Time: < 1 minutes The why, what, how, how often and how much of Cyber Risk Assessments.
Reading Time: < 1 minutes Why paying ransomware ransoms is detremental to all organizations and best practices if you experience a ransomware incident.
Reading Time: < 1 minutes A cybersecurity awareness culture should not be an afterthought reserved for Cybersecurity Awareness Month in October. Here’s how to create an engaging and motivating training program across your organization.
Reading Time: < 1 minutes The number of breaches and dollars lost skyrockets every year. Good cyber hygiene, awareness, and monitoring should not be reserved for October. CDG’s 3-Pronged approach to cybersecurity.
Reading Time: < 1 minutes CDG’s Incident Response pros guide to creating an emergency IR procedure.
Reading Time: < 1 minutes Soc-2 and ISO 27001 are two of the most common cybersecurity compliance audit options. What do they entail, what is the difference between them, and how to best execute.
Reading Time: < 1 minutes CDG Sr. Technical Program Manager gives her advice on how employee personal devices affect organizations’ cybersecurity postures and how to stay secure with BYOD policies.
Reading Time: < 1 minutes CDG’s list of seven threats to organizations working in the cloud and how best to mitigate them.
Reading Time: < 1 minutes Why it is critical to catch a cyber breach ASAP, the indicators your team should be on the alert for, and how to respond using your Incident Response Plan.
Reading Time: < 1 minutes What is a third-party – vendor-risk – assessment, how are they done, and does your organization need to invest in one?
Reading Time: < 1 minutes The California Privacy Rights Act’s January 2023 compliance deadline is almost here. Are you confident you are CPRA compliant? We breakdown what CPRA is, how it differs from CCPA and what it all means for individuals and organizations.
Reading Time: < 1 minutes What is the California Privacy Rights Act, how does it differ from the California Consumer Protection Act, and how to make sure your organization is compliant by the January 1, 2023 deadline.
Reading Time: < 1 minutes What is “Incident Response”? Why is it important, how does it work, how to assemble your Incident Response Team and Incident Response plan.
Reading Time: < 1 minutes New individual state privacy regulations in 2023 can be a confusing and daunting landscape to maneuver. Cyber Defense Group sheds some light on what you can do to keep your organization compliant with multiple privacy laws across the map.
Reading Time: < 1 minutes In 2016, frustrated with the outdated, template-driven approach to cybersecurity, I was inspired to create a different kind of cybersecurity consultancy.
Reading Time: < 1 minutes The California Privacy Rights Act’s January 2023 compliance deadline is almost here. Are you confident you are CPRA compliant? We breakdown what CPRA is, how it differs from CCPA and what it all means for individuals and organizations.
Copyright © 2023 Cyber Defense Group. All Rights Reserved