Under Attack? Contact Us

Archives

CDG

Building an Incident Response Team & IR Process

Reading Time: < 1 minute An Incident Response Team monitors and mitigates all IR activities...

Apr 30, 2020
CDG

What are CCPA Regulations?

Reading Time: < 1 minute CDG's general council breaks down CCPA requirements and how you...

Jul 16, 2020
CDG

Container Security

Reading Time: < 1 minute What are containers and why container security is vitally important...

Jul 21, 2020
Caroline Connolly

How to Implement a Successful Cyber Awareness Program

Reading Time: < 1 minute A cybersecurity awareness culture should not be an afterthought reserved...

Oct 07, 2022
CDG

Building an Incident Response Team & IR Process

Reading Time: < 1 minute An Incident Response Team monitors and mitigates all IR activities across an organization and can be the difference between business...

Apr 30, 2020
CDG

What are CCPA Regulations?

Reading Time: < 1 minute CDG's general council breaks down CCPA requirements and how you can ensure your organization is compliant.

Jul 16, 2020
CDG

Container Security

Reading Time: < 1 minute What are containers and why container security is vitally important to your development and operations.

Jul 21, 2020
Caroline Connolly

How to Implement a Successful Cyber Awareness Program

Reading Time: < 1 minute A cybersecurity awareness culture should not be an afterthought reserved for Cybersecurity Awareness Month in October. Here's how to create...

Oct 07, 2022
CDG

Cyber Threat-Modeling: A Proactive Step in Prevention

Reading Time: < 1 minute What is Cyber-Threat Modeling? Methodologies, best practices and next steps to adopting a proactive security posture.

Sep 14, 2021
CDG

Decision-Driven Cybersecurity Alert Framework

Reading Time: < 1 minute A technical breakdown of how to create a cybersecurity alert framework to keep cybersecurity teams focused during an incident.

Apr 16, 2020
CDG

Defining DevSecOps and Applying its Best Practices

Reading Time: < 1 minute What is DevSecOps and why it is becoming more and more critical to build cybersecurity in at your development stage.

Jul 24, 2020
CDG

What is Endpoint Security?

Reading Time: < 1 minute Endpoint security concerns monitoring, protection, and restriciton of endpoints - How do you secure them and why is it important?

Jul 09, 2020
CDG

How Cloud Computing Saves You Money and Gives You Peace of Mind

Reading Time: < 1 minute The importance of cloud computing to modern organizations, why it is cost-effective and the better for data security and protection.

Mar 24, 2021
CDG

How to Deal With – and Avoid – Ransomware Incidents

Reading Time: < 1 minute Why paying ransomware ransoms is detremental to all organizations and best practices if you experience a ransomware incident.

Apr 10, 2020
CDG

Treat Every Month Like Cybersecurity Awareness Month

Reading Time: < 1 minute The number of breaches and dollars lost skyrockets every year. Good cyber hygiene, awareness, and monitoring should not be reserved...

Oct 14, 2021
CDG

Initial Incident Response Procedure – The Six Critical Steps to Take

Reading Time: < 1 minute CDG's Incident Response pros guide to creating an emergency IR procedure.

Apr 28, 2020
Caroline Connolly

Decoding the MOVEit Transfer Breach: Insights and Lessons for Enhanced Cybersecurity

Reading Time: < 1 minute The significance of the monumental MOVEit Transfer breach and lessons learned about the importance of secure SDLC and baked-in cybersecurity.

Aug 02, 2023
CDG

SOC-2 and ISO 27001 Compliance and Cybersecurity

Reading Time: < 1 minute Soc-2 and ISO 27001 are two of the most common cybersecurity compliance audit options. What do they entail, what is...

Jun 08, 2021
Caroline Connolly

The Importance of Bring Your Own Device (BYOD) Policies for Organizations

Reading Time: < 1 minute CDG Sr. Technical Program Manager gives her advice on how employee personal devices affect organizations' cybersecurity postures and how to...

Sep 15, 2022
CDG

Seven Cybersecurity Threats to Cloud Computing

Reading Time: < 1 minute CDG's list of seven threats to organizations working in the cloud and how best to mitigate them.

May 06, 2020
CDG

Warning Signs of a Cloud Security Breach and How to Respond ASAP

Reading Time: < 1 minute Why it is critical to catch a cyber breach ASAP, the indicators your team should be on the alert for,...

Mar 08, 2022
CDG

What are Third Party Risk Assessments?

Reading Time: < 1 minute What are third party risk assessments, how are they done, and does your organization need to invest in one?

Sep 11, 2023
CDG

What is California Privacy Rights Act (CPRA) Compliance?

Reading Time: < 1 minute The California Privacy Rights Act's January 2023 compliance deadline is almost here. Are you confident you are CPRA compliant? We...

Nov 28, 2022
CDG

What is CPRA and How Does it Affect CCPA?

Reading Time: < 1 minute What is the California Privacy Rights Act, how does it differ from the California Consumer Protection Act, and how to...

Dec 10, 2020
CDG

What is Incident Response?

Reading Time: < 1 minute What is "Incident Response"? Why is it important, how does it work, how to assemble your Incident Response Team and...

Feb 04, 2021
CDG

What is a Third-Party Risk Assessment?

Reading Time: < 1 minute What is a third-party – vendor-risk – assessment, how are they done, and does your organization need to invest in...

Jul 10, 2023

Stay in the know, subscribe to our Newsletter.

Copyright © 2024 CDG. All Rights Reserved