Under Attack? Contact Us
Reading Time: < 1 minute What is a third-party – vendor-risk – assessment, how are they done, and does your organization need to invest in one?
Reading Time: < 1 minute What are third party risk assessments, how are they done, and does your organization need to invest in one?
Reading Time: < 1 minute Learn why cybersecurity as a service is crucial for your business. Discover how it works, its benefits, and how it can safeguard your business from cyber threats.
Reading Time: < 1 minute Senior Technical Program Mngr gives comprehensive advice and resources to help loved ones protect elders from hackers and scammers.
Reading Time: < 1 minute New individual state privacy regulations in 2023 can be a confusing and daunting landscape to maneuver. CDG sheds some light on what you can do to keep your organization compliant with multiple privacy laws across the map.
Reading Time: < 1 minute Soc-2 and ISO 27001 are two of the most common cybersecurity compliance audit options. What do they entail, what is the difference between them, and how to best execute.
Reading Time: < 1 minute The California Privacy Rights Act’s January 2023 compliance deadline is almost here. Are you confident you are CPRA compliant? We breakdown what CPRA is, how it differs from CCPA and what it all means for individuals and organizations.
Reading Time: < 1 minute CDG’s technical response to the Log4j2 exploit: who is affected and how to remediate.
Reading Time: < 1 minute Cybersecurity lessons learned and forecast in the wake of Zoom’s security fallout at the beginning of the Covid-19 shut down.
Reading Time: < 1 minute Senior Technical Program Mngr gives comprehensive advice and resources to help loved ones protect elders from hackers and scammers.
Reading Time: < 1 minute CDG’s disects lessons learned after the SolarWinds breach and how enterpise organizations can impove their cybersecuity postures.
Reading Time: < 1 minute Covid’s overwhelm on the heathcare industry and the unprecedented need for telehealth created a interwoven relationship between HIPAA and cloud computing/privacy compliance regulations.
Reading Time: < 1 minute Why ransomware ran rampant across the healthcare industry at the beginning of the Covid-19 pandemic.
Reading Time: < 1 minute New individual state privacy regulations in 2023 can be a confusing and daunting landscape to maneuver. CDG sheds some light on what you can do to keep your organization compliant with multiple privacy laws across the map.
Reading Time: < 1 minute Why paying ransomware ransoms is detremental to all organizations and best practices if you experience a ransomware incident.
Reading Time: < 1 minute CDG CEO Lou Rabon’s advice to organizations to help understand and recover from the SolarWinds breach. Video included.
Reading Time: < 1 minute CDG reacts to the “Shields Up” cyber defense alert in the days following Russia’s invasion of Ukraine giving general and specific cyber hygiene actions organizations can take immediately to secure their environments.
Reading Time: < 1 minute Here’s a list of mistakes organization are making that leave CISOs frustrated and ineffective and what they could do instead.
Reading Time: < 1 minute After a very busy season of working overtime to respond to emergency incident responses, CEO Lou Rabon gives his two cents on the #1 thing organizations should be doing to avoid cyber incidences.
Reading Time: < 1 minute The cybersecurity employment gap, the challenges facing women in cybersecurity, cybersecurity job misconceptions, and the underestimation of women’s tech saavy have all led to a stagnation for women in cyber.
Reading Time: < 1 minute Covid-19’s stay at home culture created a rushed increase in cloud computing and eCommerce. Why a bigger digital economy calls for more cybersecurity investment.
Reading Time: < 1 minute CDG’s open letter at the beginning of the Covid 19 shutdown on cybersecurity best practices for organizations forced to move to remote working.
Reading Time: < 1 minute Why trust, team building, and human relations are vital to proactive cybersecurity.
Reading Time: < 1 minute CDG’s expert cybersecurity advice in reaction to Zoom security issues when they were happening early on during the Covid-19 shutdown.
Reading Time: < 1 minute Learn why you need a cybersecurity risk assessment if you haven’t had one recently and the five step process professional cybersecurity teams take to perform cybersecurity risk assessments.
Reading Time: < 1 minute The why, what, how, how often, and how much of Risk Assessments.
Reading Time: < 1 minute What is a cybersecurity assessment? What does it entail? Learn how CDG’s team of humans will guide you through the process of a comprehensive personal and holistic review of your organization’s security risks, vulnerabilities and gaps.
Reading Time: < 1 minute What a cybersecurity risk assessment is, why your organization should invest in one, and the factors that calculate the return on that investment.
Reading Time: < 1 minute What are third party risk assessments, how are they done, and does your organization need to invest in one?
Reading Time: < 1 minute What is a third-party – vendor-risk – assessment, how are they done, and does your organization need to invest in one?
Reading Time: < 1 minute Building a cyber security budget is difficult. Let us guide you through the calculations of how much you’ll need to keep your organization secure.
Reading Time: < 1 minute The significance of the monumental MOVEit Transfer breach and lessons learned about the importance of secure SDLC and baked-in cybersecurity.
Reading Time: < 1 minute Dive into the Evolving Landscape of Cybersecurity and Compliance: Unveiling the Impact of SEC’s New Rules and Strategies for Resilience
Reading Time: < 1 minute Strengthen your cybersecurity posture to protect digital assets. Gain insights and simple best practices to bolster security measures.
Reading Time: < 1 minute The best way to stop hackers is to think like them. How CDG’s hacker mentality gives us the creative edge to protect organizations from cyber incidents and breaches.
Reading Time: < 1 minute Why it is important to build security into products and development rather than tacking it on when needed.
Reading Time: < 1 minute What to look for and the questions to ask when hiring an external cybersecurity team.
Reading Time: < 1 minute Dive into the realm of cybersecurity strategy with our guide. Uncover insights to fortify your mid-market business against digital threats.
Reading Time: < 1 minute 4 Steps to maximize value on your cybersecurity tools and relieve vendor overload.
Reading Time: < 1 minute Why ransomware ran rampant across the healthcare industry at the beginning of the Covid-19 pandemic.
Reading Time: < 1 minute The Top 5 Reasons Investing in Cybersecurity is Best Practice for Businesses
Reading Time: < 1 minute What are ransomware attacks, why are they such a looming threat to organizations of every size, and how to approach ransomware recovery using your incident response plan.
Reading Time: < 1 minute What a cybersecurity risk assessment is, why your organization should invest in one, and the factors that calculate the return on that investment.
Reading Time: < 1 minute Today just about every organization is a cloud-reliant organization and cybersecurity can be vital to success. Here’s how to create a cybersecurity budget and how to make cybersecurity cost effective.
Reading Time: < 1 minute Learn why cybersecurity as a service is crucial for your business. Discover how it works, its benefits, and how it can safeguard your business from cyber threats.
Reading Time: < 1 minute CDG’s technical response to the Log4j2 exploit: who is affected and how to remediate.
Reading Time: < 1 minute The importance of cloud computing to modern organizations, why it is cost-effective and the better for data security and protection.
Reading Time: < 1 minute Engineering corner – Dir of Engineering discusses why monitoring from the outside in is critically important: “If you can see it, you can do something about it”
Reading Time: < 1 minute An Incident Response Team monitors and mitigates all IR activities across an organization and can be the difference between business shut down and business as usual. Here’s how to build a team and IR process.
Reading Time: < 1 minute CDG’s general council breaks down CCPA requirements and how you can ensure your organization is compliant.
Reading Time: < 1 minute What are containers and why container security is vitally important to your development and operations.
Reading Time: < 1 minute A cybersecurity awareness culture should not be an afterthought reserved for Cybersecurity Awareness Month in October. Here’s how to create an engaging and motivating training program across your organization.
Reading Time: < 1 minute What is Cyber-Threat Modeling? Methodologies, best practices and next steps to adopting a proactive security posture.
Reading Time: < 1 minute A technical breakdown of how to create a cybersecurity alert framework to keep cybersecurity teams focused during an incident.
Reading Time: < 1 minute What is DevSecOps and why it is becoming more and more critical to build cybersecurity in at your development stage.
Reading Time: < 1 minute Endpoint security concerns monitoring, protection, and restriciton of endpoints – How do you secure them and why is it important?
Reading Time: < 1 minute The importance of cloud computing to modern organizations, why it is cost-effective and the better for data security and protection.
Reading Time: < 1 minute Why paying ransomware ransoms is detremental to all organizations and best practices if you experience a ransomware incident.
Reading Time: < 1 minute The number of breaches and dollars lost skyrockets every year. Good cyber hygiene, awareness, and monitoring should not be reserved for October. CDG’s 3-Pronged approach to cybersecurity.
Reading Time: < 1 minute CDG’s Incident Response pros guide to creating an emergency IR procedure.
Reading Time: < 1 minute Soc-2 and ISO 27001 are two of the most common cybersecurity compliance audit options. What do they entail, what is the difference between them, and how to best execute.
Reading Time: < 1 minute CDG Sr. Technical Program Manager gives her advice on how employee personal devices affect organizations’ cybersecurity postures and how to stay secure with BYOD policies.
Reading Time: < 1 minute CDG’s list of seven threats to organizations working in the cloud and how best to mitigate them.
Reading Time: < 1 minute Why it is critical to catch a cyber breach ASAP, the indicators your team should be on the alert for, and how to respond using your Incident Response Plan.
Reading Time: < 1 minute What are third party risk assessments, how are they done, and does your organization need to invest in one?
Reading Time: < 1 minute The California Privacy Rights Act’s January 2023 compliance deadline is almost here. Are you confident you are CPRA compliant? We breakdown what CPRA is, how it differs from CCPA and what it all means for individuals and organizations.
Reading Time: < 1 minute What is the California Privacy Rights Act, how does it differ from the California Consumer Protection Act, and how to make sure your organization is compliant by the January 1, 2023 deadline.
Reading Time: < 1 minute What is “Incident Response”? Why is it important, how does it work, how to assemble your Incident Response Team and Incident Response plan.
Reading Time: < 1 minute What is a third-party – vendor-risk – assessment, how are they done, and does your organization need to invest in one?
Reading Time: < 1 minute Building a cyber security budget is difficult. Let us guide you through the calculations of how much you’ll need to keep your organization secure.
Reading Time: < 1 minute Strengthen your cybersecurity posture to protect digital assets. Gain insights and simple best practices to bolster security measures.
Reading Time: < 1 minute The why, what, how, how often, and how much of Risk Assessments.
Copyright © 2023 CDG. All Rights Reserved